Resubmissions

12-01-2025 20:27

250112-y8qlxsxqgv 10

12-01-2025 20:17

250112-y2sgyaznep 8

12-01-2025 20:07

250112-ywfwysxlft 10

12-01-2025 19:55

250112-yngtaawrdt 10

Analysis

  • max time kernel
    532s
  • max time network
    576s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12-01-2025 20:27

General

  • Target

    99compress.py

  • Size

    2KB

  • MD5

    87ce3a21c9af0b3c2271e5ebe8f70658

  • SHA1

    f299f35fc0693a9d196f53d0e7b60e94f6cc22ac

  • SHA256

    fd08c82277d56982a16196dfa852ebbbfdd67752619274a6ddb4ad4b123f5ba3

  • SHA512

    be03c98744791881f23db47d4cf9397a2c9cb0712344f1357f7cf1f67b95574b7c270a54c66074d78ffd092d984ec7ad57661e02c16578116339cf1edf08f7f7

Malware Config

Extracted

Family

azorult

C2

http://boglogov.site/index.php

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Azorult family
  • CrimsonRAT main payload 1 IoCs
  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Crimsonrat family
  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Floxif family
  • Floxif, Floodfix

    Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Rms family
  • UAC bypass 3 TTPs 5 IoCs
  • Windows security bypass 2 TTPs 1 IoCs
  • Detects Floxif payload 1 IoCs
  • Blocks application from running via registry modification 13 IoCs

    Adds application to list of disallowed applications.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Contacts a large (1182) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Drivers directory 3 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 2 IoCs
  • Manipulates Digital Signatures 1 TTPs 12 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Modifies Windows Firewall 2 TTPs 21 IoCs
  • Sets file to hidden 1 TTPs 4 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Stops running service(s) 4 TTPs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Drops startup file 12 IoCs
  • Executes dropped EXE 61 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
  • Loads dropped DLL 12 IoCs
  • Modifies file permissions 1 TTPs 62 IoCs
  • Modifies system executable filetype association 2 TTPs 11 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Adds Run key to start application 2 TTPs 17 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Modifies WinLogon 2 TTPs 8 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 53 IoCs
  • Hide Artifacts: Hidden Users 1 TTPs 3 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 57 IoCs
  • Drops file in Windows directory 35 IoCs
  • Launches sc.exe 24 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 63 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 6 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs .reg file with regedit 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of SetWindowsHookEx 39 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Views/modifies file attributes 1 TTPs 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\99compress.py
    1⤵
      PID:656
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:6128
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\99compress.py"
        2⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:2656
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3392
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x108,0x10c,0x110,0xdc,0x114,0x7ffc3d2e3cb8,0x7ffc3d2e3cc8,0x7ffc3d2e3cd8
        2⤵
          PID:5584
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1956 /prefetch:2
          2⤵
            PID:4168
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:932
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2508 /prefetch:8
            2⤵
              PID:1092
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:1
              2⤵
                PID:5076
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
                2⤵
                  PID:3708
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:1
                  2⤵
                    PID:5888
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:1
                    2⤵
                      PID:4048
                    • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4804
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:1
                      2⤵
                        PID:3364
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:1
                        2⤵
                          PID:408
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:1
                          2⤵
                            PID:2940
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5920
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:1
                            2⤵
                              PID:2440
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:1
                              2⤵
                                PID:4928
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:1
                                2⤵
                                  PID:4832
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1892 /prefetch:1
                                  2⤵
                                    PID:3000
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:1
                                    2⤵
                                      PID:2688
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                                      2⤵
                                        PID:4368
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:8
                                        2⤵
                                        • NTFS ADS
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:692
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
                                        2⤵
                                          PID:2060
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5740 /prefetch:2
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:3424
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1412,17181028688990299049,12483966405237604062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:1
                                          2⤵
                                            PID:3616
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:3760
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:5620
                                            • C:\Windows\System32\NOTEPAD.EXE
                                              "C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Desktop\run.bat
                                              1⤵
                                              • Opens file in notepad (likely ransom note)
                                              PID:104
                                            • C:\Windows\System32\rundll32.exe
                                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                              1⤵
                                                PID:5620
                                              • C:\Program Files\7-Zip\7zG.exe
                                                "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\The-MALWARE-Repo-master\" -spe -an -ai#7zMap27593:108:7zEvent19659
                                                1⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:584
                                              • C:\Windows\System32\DataExchangeHost.exe
                                                C:\Windows\System32\DataExchangeHost.exe -Embedding
                                                1⤵
                                                  PID:3172
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Joke\YouAreAnIdiot\WebsiteSourceCode\lol.html
                                                  1⤵
                                                    PID:656
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc3d2e3cb8,0x7ffc3d2e3cc8,0x7ffc3d2e3cd8
                                                      2⤵
                                                        PID:3408
                                                    • C:\Windows\System32\DataExchangeHost.exe
                                                      C:\Windows\System32\DataExchangeHost.exe -Embedding
                                                      1⤵
                                                        PID:3240
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Desktop\run.bat"
                                                        1⤵
                                                          PID:4944
                                                          • C:\Users\Admin\Desktop\AgentTesla.exe
                                                            "AgentTesla.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5836
                                                          • C:\Users\Admin\Desktop\Amus.exe
                                                            "Amus.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            • Adds Run key to start application
                                                            • Drops file in Windows directory
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:5332
                                                          • C:\Users\Admin\Desktop\Anap.a.exe
                                                            "Anap.a.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            PID:2344
                                                          • C:\Users\Admin\Desktop\Avoid.exe
                                                            "Avoid.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5504
                                                          • C:\Users\Admin\Desktop\Axam.a.exe
                                                            "Axam.a.exe"
                                                            2⤵
                                                            • Drops startup file
                                                            • Executes dropped EXE
                                                            • Adds Run key to start application
                                                            • Drops file in Program Files directory
                                                            • Modifies registry class
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:3624
                                                          • C:\Users\Admin\Desktop\Azorult.exe
                                                            "Azorult.exe"
                                                            2⤵
                                                            • Modifies Windows Defender Real-time Protection settings
                                                            • UAC bypass
                                                            • Blocks application from running via registry modification
                                                            • Drops file in Drivers directory
                                                            • Executes dropped EXE
                                                            • Checks whether UAC is enabled
                                                            • Modifies WinLogon
                                                            • Hide Artifacts: Hidden Users
                                                            • Drops file in Program Files directory
                                                            • System policy modification
                                                            PID:2080
                                                            • C:\ProgramData\Microsoft\Intel\wini.exe
                                                              C:\ProgramData\Microsoft\Intel\wini.exe -pnaxui
                                                              3⤵
                                                              • Executes dropped EXE
                                                              PID:3092
                                                              • C:\Windows\SysWOW64\WScript.exe
                                                                "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\install.vbs"
                                                                4⤵
                                                                  PID:3768
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c ""C:\Programdata\Windows\install.bat" "
                                                                    5⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:3956
                                                                    • C:\Windows\SysWOW64\regedit.exe
                                                                      regedit /s "reg1.reg"
                                                                      6⤵
                                                                      • UAC bypass
                                                                      • Windows security bypass
                                                                      • Hide Artifacts: Hidden Users
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Runs .reg file with regedit
                                                                      PID:4580
                                                                    • C:\Windows\SysWOW64\regedit.exe
                                                                      regedit /s "reg2.reg"
                                                                      6⤵
                                                                      • Runs .reg file with regedit
                                                                      PID:3788
                                                                    • C:\Windows\SysWOW64\timeout.exe
                                                                      timeout 2
                                                                      6⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Delays execution with timeout.exe
                                                                      PID:5044
                                                                    • C:\ProgramData\Windows\rutserv.exe
                                                                      rutserv.exe /silentinstall
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:4484
                                                                    • C:\ProgramData\Windows\rutserv.exe
                                                                      rutserv.exe /firewall
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:5204
                                                                    • C:\ProgramData\Windows\rutserv.exe
                                                                      rutserv.exe /start
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:5928
                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                      ATTRIB +H +S C:\Programdata\Windows\*.*
                                                                      6⤵
                                                                      • Views/modifies file attributes
                                                                      PID:4224
                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                      ATTRIB +H +S C:\Programdata\Windows
                                                                      6⤵
                                                                      • Views/modifies file attributes
                                                                      PID:5568
                                                                    • C:\Windows\SysWOW64\sc.exe
                                                                      sc failure RManService reset= 0 actions= restart/1000/restart/1000/restart/1000
                                                                      6⤵
                                                                      • Launches sc.exe
                                                                      PID:1620
                                                                    • C:\Windows\SysWOW64\sc.exe
                                                                      sc config RManService obj= LocalSystem type= interact type= own
                                                                      6⤵
                                                                      • Launches sc.exe
                                                                      PID:4512
                                                                    • C:\Windows\SysWOW64\sc.exe
                                                                      sc config RManService DisplayName= "Microsoft Framework"
                                                                      6⤵
                                                                      • Launches sc.exe
                                                                      PID:868
                                                                • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                                  "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\ProgramData\Windows\winit.exe"
                                                                  4⤵
                                                                  • Drops startup file
                                                                  • Executes dropped EXE
                                                                  • Adds Run key to start application
                                                                  • Drops file in Program Files directory
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2164
                                                              • C:\programdata\install\cheat.exe
                                                                C:\programdata\install\cheat.exe -pnaxui
                                                                3⤵
                                                                • Executes dropped EXE
                                                                PID:5452
                                                                • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                                  "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\ProgramData\Microsoft\Intel\taskhost.exe"
                                                                  4⤵
                                                                  • Drops startup file
                                                                  • Executes dropped EXE
                                                                  • Adds Run key to start application
                                                                  • Drops file in Program Files directory
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:4812
                                                              • C:\programdata\install\ink.exe
                                                                C:\programdata\install\ink.exe
                                                                3⤵
                                                                • Executes dropped EXE
                                                                PID:2776
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c sc start appidsvc
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1116
                                                                • C:\Windows\SysWOW64\sc.exe
                                                                  sc start appidsvc
                                                                  4⤵
                                                                  • Launches sc.exe
                                                                  PID:1912
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c sc start appmgmt
                                                                3⤵
                                                                  PID:5404
                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                    sc start appmgmt
                                                                    4⤵
                                                                    • Launches sc.exe
                                                                    PID:3880
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c sc config appidsvc start= auto
                                                                  3⤵
                                                                    PID:5512
                                                                    • C:\Windows\SysWOW64\sc.exe
                                                                      sc config appidsvc start= auto
                                                                      4⤵
                                                                      • Launches sc.exe
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:5372
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c sc config appmgmt start= auto
                                                                    3⤵
                                                                      PID:3728
                                                                      • C:\Windows\SysWOW64\sc.exe
                                                                        sc config appmgmt start= auto
                                                                        4⤵
                                                                        • Launches sc.exe
                                                                        PID:3996
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c sc delete swprv
                                                                      3⤵
                                                                        PID:3036
                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                          sc delete swprv
                                                                          4⤵
                                                                          • Launches sc.exe
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3644
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c sc stop mbamservice
                                                                        3⤵
                                                                          PID:1644
                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                            sc stop mbamservice
                                                                            4⤵
                                                                            • Launches sc.exe
                                                                            PID:772
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c sc stop bytefenceservice
                                                                          3⤵
                                                                            PID:4440
                                                                            • C:\Windows\SysWOW64\sc.exe
                                                                              sc stop bytefenceservice
                                                                              4⤵
                                                                              • Launches sc.exe
                                                                              PID:5376
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c sc delete bytefenceservice
                                                                            3⤵
                                                                              PID:3632
                                                                              • C:\Windows\SysWOW64\sc.exe
                                                                                sc delete bytefenceservice
                                                                                4⤵
                                                                                • Launches sc.exe
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:1716
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c sc delete mbamservice
                                                                              3⤵
                                                                                PID:5932
                                                                                • C:\Windows\SysWOW64\sc.exe
                                                                                  sc delete mbamservice
                                                                                  4⤵
                                                                                  • Launches sc.exe
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:5516
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c sc delete crmsvc
                                                                                3⤵
                                                                                  PID:1268
                                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                                    sc delete crmsvc
                                                                                    4⤵
                                                                                    • Launches sc.exe
                                                                                    PID:2768
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c sc delete "windows node"
                                                                                  3⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:4396
                                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                                    sc delete "windows node"
                                                                                    4⤵
                                                                                    • Launches sc.exe
                                                                                    PID:6096
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c sc stop Adobeflashplayer
                                                                                  3⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:5628
                                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                                    sc stop Adobeflashplayer
                                                                                    4⤵
                                                                                    • Launches sc.exe
                                                                                    PID:4616
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c sc delete AdobeFlashPlayer
                                                                                  3⤵
                                                                                    PID:2076
                                                                                    • C:\Windows\SysWOW64\sc.exe
                                                                                      sc delete AdobeFlashPlayer
                                                                                      4⤵
                                                                                      • Launches sc.exe
                                                                                      PID:724
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c sc stop MoonTitle
                                                                                    3⤵
                                                                                      PID:5844
                                                                                      • C:\Windows\SysWOW64\sc.exe
                                                                                        sc stop MoonTitle
                                                                                        4⤵
                                                                                        • Launches sc.exe
                                                                                        PID:5868
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c sc delete MoonTitle"
                                                                                      3⤵
                                                                                        PID:5860
                                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                                          sc delete MoonTitle"
                                                                                          4⤵
                                                                                          • Launches sc.exe
                                                                                          PID:4612
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c sc stop AudioServer
                                                                                        3⤵
                                                                                          PID:2628
                                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                                            sc stop AudioServer
                                                                                            4⤵
                                                                                            • Launches sc.exe
                                                                                            PID:4008
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c sc delete AudioServer"
                                                                                          3⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:3564
                                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                                            sc delete AudioServer"
                                                                                            4⤵
                                                                                            • Launches sc.exe
                                                                                            PID:6068
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c sc stop clr_optimization_v4.0.30318_64
                                                                                          3⤵
                                                                                            PID:5360
                                                                                            • C:\Windows\SysWOW64\sc.exe
                                                                                              sc stop clr_optimization_v4.0.30318_64
                                                                                              4⤵
                                                                                              • Launches sc.exe
                                                                                              PID:5044
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c sc delete clr_optimization_v4.0.30318_64"
                                                                                            3⤵
                                                                                              PID:4196
                                                                                              • C:\Windows\SysWOW64\sc.exe
                                                                                                sc delete clr_optimization_v4.0.30318_64"
                                                                                                4⤵
                                                                                                • Launches sc.exe
                                                                                                PID:1584
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c sc stop MicrosoftMysql
                                                                                              3⤵
                                                                                                PID:1500
                                                                                                • C:\Windows\SysWOW64\sc.exe
                                                                                                  sc stop MicrosoftMysql
                                                                                                  4⤵
                                                                                                  • Launches sc.exe
                                                                                                  PID:3396
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c sc delete MicrosoftMysql
                                                                                                3⤵
                                                                                                  PID:4224
                                                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                                                    sc delete MicrosoftMysql
                                                                                                    4⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:4296
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c netsh advfirewall set allprofiles state on
                                                                                                  3⤵
                                                                                                    PID:5320
                                                                                                    • C:\Windows\SysWOW64\netsh.exe
                                                                                                      netsh advfirewall set allprofiles state on
                                                                                                      4⤵
                                                                                                      • Modifies Windows Firewall
                                                                                                      • Event Triggered Execution: Netsh Helper DLL
                                                                                                      PID:5352
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN
                                                                                                    3⤵
                                                                                                      PID:5976
                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                        netsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN
                                                                                                        4⤵
                                                                                                        • Modifies Windows Firewall
                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                        PID:4920
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN
                                                                                                      3⤵
                                                                                                        PID:3244
                                                                                                        • C:\Windows\SysWOW64\netsh.exe
                                                                                                          netsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN
                                                                                                          4⤵
                                                                                                          • Modifies Windows Firewall
                                                                                                          • Event Triggered Execution: Netsh Helper DLL
                                                                                                          PID:348
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN
                                                                                                        3⤵
                                                                                                          PID:1860
                                                                                                          • C:\Windows\SysWOW64\netsh.exe
                                                                                                            netsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN
                                                                                                            4⤵
                                                                                                            • Modifies Windows Firewall
                                                                                                            • Event Triggered Execution: Netsh Helper DLL
                                                                                                            PID:3752
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN
                                                                                                          3⤵
                                                                                                            PID:1548
                                                                                                            • C:\Windows\SysWOW64\netsh.exe
                                                                                                              netsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN
                                                                                                              4⤵
                                                                                                              • Modifies Windows Firewall
                                                                                                              • Event Triggered Execution: Netsh Helper DLL
                                                                                                              PID:5568
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Recovery Service" dir=in action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes
                                                                                                            3⤵
                                                                                                              PID:5260
                                                                                                              • C:\Windows\SysWOW64\netsh.exe
                                                                                                                netsh advfirewall firewall add rule name="Recovery Service" dir=in action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes
                                                                                                                4⤵
                                                                                                                • Modifies Windows Firewall
                                                                                                                • Event Triggered Execution: Netsh Helper DLL
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:4260
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Shadow Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes
                                                                                                              3⤵
                                                                                                                PID:5168
                                                                                                                • C:\Windows\SysWOW64\netsh.exe
                                                                                                                  netsh advfirewall firewall add rule name="Shadow Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes
                                                                                                                  4⤵
                                                                                                                  • Modifies Windows Firewall
                                                                                                                  • Event Triggered Execution: Netsh Helper DLL
                                                                                                                  PID:3792
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Security Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes
                                                                                                                3⤵
                                                                                                                  PID:4252
                                                                                                                  • C:\Windows\SysWOW64\netsh.exe
                                                                                                                    netsh advfirewall firewall add rule name="Security Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes
                                                                                                                    4⤵
                                                                                                                    • Modifies Windows Firewall
                                                                                                                    • Event Triggered Execution: Netsh Helper DLL
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:3644
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Recovery Services" dir=out action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes
                                                                                                                  3⤵
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:5404
                                                                                                                  • C:\Windows\SysWOW64\netsh.exe
                                                                                                                    netsh advfirewall firewall add rule name="Recovery Services" dir=out action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes
                                                                                                                    4⤵
                                                                                                                    • Modifies Windows Firewall
                                                                                                                    • Event Triggered Execution: Netsh Helper DLL
                                                                                                                    PID:1932
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Shadow Services" dir=out action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes
                                                                                                                  3⤵
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:5212
                                                                                                                  • C:\Windows\SysWOW64\netsh.exe
                                                                                                                    netsh advfirewall firewall add rule name="Shadow Services" dir=out action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes
                                                                                                                    4⤵
                                                                                                                    • Modifies Windows Firewall
                                                                                                                    • Event Triggered Execution: Netsh Helper DLL
                                                                                                                    PID:4844
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Security Services" dir=out action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes
                                                                                                                  3⤵
                                                                                                                    PID:4064
                                                                                                                    • C:\Windows\SysWOW64\netsh.exe
                                                                                                                      netsh advfirewall firewall add rule name="Security Services" dir=out action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes
                                                                                                                      4⤵
                                                                                                                      • Modifies Windows Firewall
                                                                                                                      • Event Triggered Execution: Netsh Helper DLL
                                                                                                                      PID:2336
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Survile Service" dir=in action=allow program="C:\ProgramData\RealtekHD\taskhostw.exe" enable=yes
                                                                                                                    3⤵
                                                                                                                      PID:1716
                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                        netsh advfirewall firewall add rule name="Survile Service" dir=in action=allow program="C:\ProgramData\RealtekHD\taskhostw.exe" enable=yes
                                                                                                                        4⤵
                                                                                                                        • Modifies Windows Firewall
                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                        PID:2576
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="System Service" dir=in action=allow program="C:\ProgramData\windows\rutserv.exe" enable=yes
                                                                                                                      3⤵
                                                                                                                        PID:2956
                                                                                                                        • C:\Windows\SysWOW64\netsh.exe
                                                                                                                          netsh advfirewall firewall add rule name="System Service" dir=in action=allow program="C:\ProgramData\windows\rutserv.exe" enable=yes
                                                                                                                          4⤵
                                                                                                                          • Modifies Windows Firewall
                                                                                                                          • Event Triggered Execution: Netsh Helper DLL
                                                                                                                          PID:1992
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Shell Service" dir=in action=allow program="C:\ProgramData\rundll\system.exe" enable=yes
                                                                                                                        3⤵
                                                                                                                          PID:4244
                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                            4⤵
                                                                                                                              PID:4396
                                                                                                                            • C:\Windows\SysWOW64\netsh.exe
                                                                                                                              netsh advfirewall firewall add rule name="Shell Service" dir=in action=allow program="C:\ProgramData\rundll\system.exe" enable=yes
                                                                                                                              4⤵
                                                                                                                              • Modifies Windows Firewall
                                                                                                                              • Event Triggered Execution: Netsh Helper DLL
                                                                                                                              PID:5628
                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Script Service" dir=in action=allow program="C:\ProgramData\rundll\rundll.exe" enable=yes
                                                                                                                            3⤵
                                                                                                                              PID:1140
                                                                                                                              • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                netsh advfirewall firewall add rule name="Script Service" dir=in action=allow program="C:\ProgramData\rundll\rundll.exe" enable=yes
                                                                                                                                4⤵
                                                                                                                                • Modifies Windows Firewall
                                                                                                                                • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                PID:5488
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Micro Service" dir=in action=allow program="C:\ProgramData\rundll\Doublepulsar-1.3.1.exe" enable=yes
                                                                                                                              3⤵
                                                                                                                                PID:5716
                                                                                                                                • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                  netsh advfirewall firewall add rule name="Micro Service" dir=in action=allow program="C:\ProgramData\rundll\Doublepulsar-1.3.1.exe" enable=yes
                                                                                                                                  4⤵
                                                                                                                                  • Modifies Windows Firewall
                                                                                                                                  • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                  PID:5876
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Small Service" dir=in action=allow program="C:\ProgramData\rundll\Eternalblue-2.2.0.exe" enable=yes
                                                                                                                                3⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:1200
                                                                                                                                • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                  netsh advfirewall firewall add rule name="Small Service" dir=in action=allow program="C:\ProgramData\rundll\Eternalblue-2.2.0.exe" enable=yes
                                                                                                                                  4⤵
                                                                                                                                  • Modifies Windows Firewall
                                                                                                                                  • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                  PID:5108
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AllowPort1" protocol=TCP localport=9494 action=allow dir=IN
                                                                                                                                3⤵
                                                                                                                                  PID:4652
                                                                                                                                  • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                    netsh advfirewall firewall add rule name="AllowPort1" protocol=TCP localport=9494 action=allow dir=IN
                                                                                                                                    4⤵
                                                                                                                                    • Modifies Windows Firewall
                                                                                                                                    • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                    PID:5616
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AllowPort2" protocol=TCP localport=9393 action=allow dir=IN
                                                                                                                                  3⤵
                                                                                                                                    PID:5044
                                                                                                                                    • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                      netsh advfirewall firewall add rule name="AllowPort2" protocol=TCP localport=9393 action=allow dir=IN
                                                                                                                                      4⤵
                                                                                                                                      • Modifies Windows Firewall
                                                                                                                                      • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                      PID:3884
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AllowPort3" protocol=TCP localport=9494 action=allow dir=out
                                                                                                                                    3⤵
                                                                                                                                      PID:4484
                                                                                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                        netsh advfirewall firewall add rule name="AllowPort3" protocol=TCP localport=9494 action=allow dir=out
                                                                                                                                        4⤵
                                                                                                                                        • Modifies Windows Firewall
                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:2548
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AllowPort4" protocol=TCP localport=9393 action=allow dir=out
                                                                                                                                      3⤵
                                                                                                                                        PID:2052
                                                                                                                                        • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                          netsh advfirewall firewall add rule name="AllowPort4" protocol=TCP localport=9393 action=allow dir=out
                                                                                                                                          4⤵
                                                                                                                                          • Modifies Windows Firewall
                                                                                                                                          • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:2508
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Microsoft JDX" /deny %username%:(OI)(CI)(F)
                                                                                                                                        3⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:5040
                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                          4⤵
                                                                                                                                            PID:4296
                                                                                                                                          • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                            icacls "C:\Program Files (x86)\Microsoft JDX" /deny Admin:(OI)(CI)(F)
                                                                                                                                            4⤵
                                                                                                                                            • Modifies file permissions
                                                                                                                                            PID:1612
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Microsoft JDX" /deny System:(OI)(CI)(F)
                                                                                                                                          3⤵
                                                                                                                                            PID:3168
                                                                                                                                            • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                              icacls "C:\Program Files (x86)\Microsoft JDX" /deny System:(OI)(CI)(F)
                                                                                                                                              4⤵
                                                                                                                                              • Modifies file permissions
                                                                                                                                              PID:3800
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny %username%:(OI)(CI)(F)
                                                                                                                                            3⤵
                                                                                                                                              PID:3656
                                                                                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny Admin:(OI)(CI)(F)
                                                                                                                                                4⤵
                                                                                                                                                • Modifies file permissions
                                                                                                                                                PID:6056
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny System:(OI)(CI)(F)
                                                                                                                                              3⤵
                                                                                                                                                PID:3188
                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                  icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny System:(OI)(CI)(F)
                                                                                                                                                  4⤵
                                                                                                                                                  • Modifies file permissions
                                                                                                                                                  PID:2020
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Windows\svchost.exe" /deny %username%:(OI)(CI)(F)
                                                                                                                                                3⤵
                                                                                                                                                  PID:2540
                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                    4⤵
                                                                                                                                                      PID:5372
                                                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                      icacls "C:\Windows\svchost.exe" /deny Admin:(OI)(CI)(F)
                                                                                                                                                      4⤵
                                                                                                                                                      • Modifies file permissions
                                                                                                                                                      PID:3244
                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\Windows\svchost.exe" /deny system:(OI)(CI)(F)
                                                                                                                                                    3⤵
                                                                                                                                                      PID:6072
                                                                                                                                                      • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                        icacls "C:\Windows\svchost.exe" /deny system:(OI)(CI)(F)
                                                                                                                                                        4⤵
                                                                                                                                                        • Modifies file permissions
                                                                                                                                                        PID:5156
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny %username%:(OI)(CI)(F)
                                                                                                                                                      3⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:5412
                                                                                                                                                      • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                        icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny Admin:(OI)(CI)(F)
                                                                                                                                                        4⤵
                                                                                                                                                        • Modifies file permissions
                                                                                                                                                        PID:1192
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)
                                                                                                                                                      3⤵
                                                                                                                                                        PID:5512
                                                                                                                                                        • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                          icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)
                                                                                                                                                          4⤵
                                                                                                                                                          • Modifies file permissions
                                                                                                                                                          PID:812
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\Windows\Fonts\Mysql" /deny %username%:(OI)(CI)(F)
                                                                                                                                                        3⤵
                                                                                                                                                          PID:1264
                                                                                                                                                          • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                            icacls "C:\Windows\Fonts\Mysql" /deny Admin:(OI)(CI)(F)
                                                                                                                                                            4⤵
                                                                                                                                                            • Modifies file permissions
                                                                                                                                                            PID:1548
                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls "C:\Windows\Fonts\Mysql" /deny System:(OI)(CI)(F)
                                                                                                                                                          3⤵
                                                                                                                                                            PID:3236
                                                                                                                                                            • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                              icacls "C:\Windows\Fonts\Mysql" /deny System:(OI)(CI)(F)
                                                                                                                                                              4⤵
                                                                                                                                                              • Modifies file permissions
                                                                                                                                                              PID:5340
                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "c:\program files\Internet Explorer\bin" /deny %username%:(OI)(CI)(F)
                                                                                                                                                            3⤵
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:2280
                                                                                                                                                            • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                              icacls "c:\program files\Internet Explorer\bin" /deny Admin:(OI)(CI)(F)
                                                                                                                                                              4⤵
                                                                                                                                                              • Modifies file permissions
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:5404
                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "c:\program files\Internet Explorer\bin" /deny system:(OI)(CI)(F)
                                                                                                                                                            3⤵
                                                                                                                                                              PID:5084
                                                                                                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                icacls "c:\program files\Internet Explorer\bin" /deny system:(OI)(CI)(F)
                                                                                                                                                                4⤵
                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                PID:4676
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Zaxar" /deny %username%:(OI)(CI)(F)
                                                                                                                                                              3⤵
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:1116
                                                                                                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                icacls "C:\Program Files (x86)\Zaxar" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                4⤵
                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                PID:1568
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Zaxar" /deny system:(OI)(CI)(F)
                                                                                                                                                              3⤵
                                                                                                                                                                PID:2352
                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                  icacls "C:\Program Files (x86)\Zaxar" /deny system:(OI)(CI)(F)
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                  PID:580
                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls C:\Windows\speechstracing /deny %username%:(OI)(CI)(F)
                                                                                                                                                                3⤵
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                PID:4620
                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                  icacls C:\Windows\speechstracing /deny Admin:(OI)(CI)(F)
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                  PID:5148
                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls C:\Windows\speechstracing /deny system:(OI)(CI)(F)
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:6120
                                                                                                                                                                  • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                    icacls C:\Windows\speechstracing /deny system:(OI)(CI)(F)
                                                                                                                                                                    4⤵
                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                    PID:1764
                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls c:\programdata\Malwarebytes /deny %username%:(F)
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:3364
                                                                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                      icacls c:\programdata\Malwarebytes /deny Admin:(F)
                                                                                                                                                                      4⤵
                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                      PID:5608
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls c:\programdata\Malwarebytes /deny System:(F)
                                                                                                                                                                    3⤵
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    PID:2948
                                                                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                      icacls c:\programdata\Malwarebytes /deny System:(F)
                                                                                                                                                                      4⤵
                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:3172
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls C:\Programdata\MB3Install /deny %username%:(F)
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:240
                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:5348
                                                                                                                                                                        • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                          icacls C:\Programdata\MB3Install /deny Admin:(F)
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                          PID:1344
                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls C:\Programdata\MB3Install /deny System:(F)
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:5160
                                                                                                                                                                          • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                            icacls C:\Programdata\MB3Install /deny System:(F)
                                                                                                                                                                            4⤵
                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                            PID:840
                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls C:\Programdata\Indus /deny %username%:(OI)(CI)(F)
                                                                                                                                                                          3⤵
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          PID:972
                                                                                                                                                                          • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                            icacls C:\Programdata\Indus /deny Admin:(OI)(CI)(F)
                                                                                                                                                                            4⤵
                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            PID:1140
                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls C:\Programdata\Indus /deny System:(OI)(CI)(F)
                                                                                                                                                                          3⤵
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          PID:3332
                                                                                                                                                                          • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                            icacls C:\Programdata\Indus /deny System:(OI)(CI)(F)
                                                                                                                                                                            4⤵
                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            PID:5624
                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Driver Foundation Visions VHG" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:1420
                                                                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:4612
                                                                                                                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                icacls "C:\Programdata\Driver Foundation Visions VHG" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                4⤵
                                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                                PID:488
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Driver Foundation Visions VHG" /deny System:(OI)(CI)(F)
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:5164
                                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                  icacls "C:\Programdata\Driver Foundation Visions VHG" /deny System:(OI)(CI)(F)
                                                                                                                                                                                  4⤵
                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                  PID:3056
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls C:\AdwCleaner /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                3⤵
                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                PID:720
                                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                  icacls C:\AdwCleaner /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                  4⤵
                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                  PID:1108
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ByteFence" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                3⤵
                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                PID:4116
                                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                  icacls "C:\Program Files\ByteFence" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                  4⤵
                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                  PID:5560
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls C:\KVRT_Data /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:4548
                                                                                                                                                                                  • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                    icacls C:\KVRT_Data /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    PID:1152
                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls C:\KVRT_Data /deny system:(OI)(CI)(F)
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:1852
                                                                                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                      icacls C:\KVRT_Data /deny system:(OI)(CI)(F)
                                                                                                                                                                                      4⤵
                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      PID:5192
                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\360" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:5928
                                                                                                                                                                                      • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                        icacls "C:\Program Files (x86)\360" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                        4⤵
                                                                                                                                                                                        • Modifies file permissions
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        PID:3964
                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\360safe" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:1028
                                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                          4⤵
                                                                                                                                                                                            PID:4484
                                                                                                                                                                                          • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                            icacls "C:\ProgramData\360safe" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                            4⤵
                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                            PID:4920
                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\SpyHunter" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:3208
                                                                                                                                                                                            • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                              icacls "C:\Program Files (x86)\SpyHunter" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                              4⤵
                                                                                                                                                                                              • Modifies file permissions
                                                                                                                                                                                              PID:3168
                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Malwarebytes" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:2776
                                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:1612
                                                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                  icacls "C:\Program Files\Malwarebytes" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                  PID:6056
                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\COMODO" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                PID:5620
                                                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                  icacls "C:\Program Files\COMODO" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                  PID:2832
                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Enigma Software Group" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:3752
                                                                                                                                                                                                  • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                    icacls "C:\Program Files\Enigma Software Group" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                    PID:5604
                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\SpyHunter" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                  PID:3776
                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                      PID:5320
                                                                                                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                      icacls "C:\Program Files\SpyHunter" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                      PID:3300
                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\AVAST Software" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:5568
                                                                                                                                                                                                      • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                        icacls "C:\Program Files\AVAST Software" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                        • Modifies file permissions
                                                                                                                                                                                                        PID:4828
                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\AVAST Software" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:1060
                                                                                                                                                                                                        • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                          icacls "C:\Program Files (x86)\AVAST Software" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                          PID:5884
                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\Programdata\AVAST Software" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:6008
                                                                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                              PID:3792
                                                                                                                                                                                                            • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                              icacls "C:\Programdata\AVAST Software" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                              • Modifies file permissions
                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                              PID:3616
                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\AVG" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:4708
                                                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:1620
                                                                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                  icacls "C:\Program Files\AVG" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                  PID:3532
                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\AVG" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                  PID:580
                                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                      PID:4676
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                      icacls "C:\Program Files (x86)\AVG" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                      PID:3692
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Norton" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                    PID:2280
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                      icacls "C:\ProgramData\Norton" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                      PID:1932
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:4804
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                        icacls "C:\Programdata\Kaspersky Lab" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                        • Modifies file permissions
                                                                                                                                                                                                                        PID:2732
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:5608
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                          icacls "C:\Programdata\Kaspersky Lab" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                          PID:3364
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:5684
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                            icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                                                            PID:1008
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:1992
                                                                                                                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                PID:2956
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                                                                                PID:1188
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Kaspersky Lab" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:2768
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                  icacls "C:\Program Files\Kaspersky Lab" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                                                  PID:3304
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Kaspersky Lab" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:5956
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                    icacls "C:\Program Files\Kaspersky Lab" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                    PID:2076
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Kaspersky Lab" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:2560
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                      icacls "C:\Program Files (x86)\Kaspersky Lab" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      PID:6068
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Kaspersky Lab" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:4364
                                                                                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                          PID:5844
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                          icacls "C:\Program Files (x86)\Kaspersky Lab" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                          PID:2296
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Doctor Web" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:5748
                                                                                                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                              PID:5716
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                              icacls "C:\ProgramData\Doctor Web" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                              • Modifies file permissions
                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                              PID:5108
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\grizzly" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:720
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                icacls "C:\ProgramData\grizzly" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                PID:1584
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Cezurity" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:3120
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                  icacls "C:\Program Files (x86)\Cezurity" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                  PID:5012
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Cezurity" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:5256
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                    icacls "C:\Program Files\Cezurity" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                    PID:1760
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\McAfee" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:4680
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                      icacls "C:\ProgramData\McAfee" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                      PID:4420
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\McAfee" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:5344
                                                                                                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                          PID:3396
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                          icacls "C:\Program Files\Common Files\McAfee" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                          PID:4368
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Avira" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:4640
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                            icacls "C:\ProgramData\Avira" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                                                                                            PID:3016
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\GRIZZLY Antivirus" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:5432
                                                                                                                                                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                                PID:4224
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                icacls "C:\Program Files (x86)\GRIZZLY Antivirus" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                                                                                                                PID:3424
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ESET" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                              PID:200
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                icacls "C:\Program Files\ESET" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                                                                                                                PID:1792
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ESET" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                              PID:32
                                                                                                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                  PID:5620
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                  icacls "C:\Program Files\ESET" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                  PID:4792
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\ESET" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                  PID:4004
                                                                                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                                      PID:3752
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                      icacls "C:\ProgramData\ESET" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                                      PID:2844
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\ESET" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                      PID:2256
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                        icacls "C:\ProgramData\ESET" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                        • Modifies file permissions
                                                                                                                                                                                                                                                                        PID:3300
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Panda Security" /deny %username%:(OI)(CI)(F)
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                        PID:1936
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                          icacls "C:\Program Files (x86)\Panda Security" /deny Admin:(OI)(CI)(F)
                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                                          PID:5888
                                                                                                                                                                                                                                                                    • C:\Users\Admin\Desktop\Bezilom.exe
                                                                                                                                                                                                                                                                      "Bezilom.exe"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                      PID:4044
                                                                                                                                                                                                                                                                    • C:\Users\Admin\Desktop\Blackkomet.exe
                                                                                                                                                                                                                                                                      "Blackkomet.exe"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                      • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                      PID:1048
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                        attrib "C:\Users\Admin\Desktop\Blackkomet.exe" +s +h
                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                        • Sets file to hidden
                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                                                                                                                        PID:5884
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                        attrib "C:\Users\Admin\Desktop" +s +h
                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                        • Sets file to hidden
                                                                                                                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                                                                                                                        PID:1124
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                                                                                                                        "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                        • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                        PID:5348
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                                                                                                                          PID:2576
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                                                                                                                          PID:2956
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                          • Drops startup file
                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                                                                                                                          • Drops file in Program Files directory
                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                          PID:4324
                                                                                                                                                                                                                                                                    • C:\Users\Admin\Desktop\Blaster.A.exe
                                                                                                                                                                                                                                                                      "Blaster.A.exe"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                      PID:6112
                                                                                                                                                                                                                                                                    • C:\Users\Admin\Desktop\Blaster.E.exe
                                                                                                                                                                                                                                                                      "Blaster.E.exe"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                                                                                                                                      PID:248
                                                                                                                                                                                                                                                                    • C:\Users\Admin\Desktop\Brontok.exe
                                                                                                                                                                                                                                                                      "Brontok.exe"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                      PID:2508
                                                                                                                                                                                                                                                                    • C:\Users\Admin\Desktop\Bugsoft.exe
                                                                                                                                                                                                                                                                      "Bugsoft.exe"
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                      PID:5964
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c c:\windows\jk.bat
                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                          PID:5736
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Bumerang.exe
                                                                                                                                                                                                                                                                        "Bumerang.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                                                        PID:1568
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\ddraw32.dll
                                                                                                                                                                                                                                                                          C:\Windows\system32\ddraw32.dll
                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                          PID:3400
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 352
                                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                                            • Program crash
                                                                                                                                                                                                                                                                            PID:5604
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\ddraw32.dll
                                                                                                                                                                                                                                                                          C:\Windows\system32\ddraw32.dll :C:\Users\Admin\Desktop\Bumerang.exe
                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                          PID:3360
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\ChilledWindows.exe
                                                                                                                                                                                                                                                                        "ChilledWindows.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • Enumerates connected drives
                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                        PID:5188
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\CookieClickerHack.exe
                                                                                                                                                                                                                                                                        "CookieClickerHack.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        PID:3368
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\CrazyNCS.exe
                                                                                                                                                                                                                                                                        "CrazyNCS.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        PID:2424
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\CrimsonRAT.exe
                                                                                                                                                                                                                                                                        "CrimsonRAT.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        PID:5932
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                          PID:3820
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Curfun.exe
                                                                                                                                                                                                                                                                        "Curfun.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        PID:5380
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\DanaBot.exe
                                                                                                                                                                                                                                                                        "DanaBot.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        PID:2152
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 304
                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                          • Program crash
                                                                                                                                                                                                                                                                          PID:2832
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\DesktopBoom.exe
                                                                                                                                                                                                                                                                        "DesktopBoom.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                                                                                                        PID:6000
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Duksten.exe
                                                                                                                                                                                                                                                                        "Duksten.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                                                        PID:4716
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\EternalRocks.exe
                                                                                                                                                                                                                                                                        "EternalRocks.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        PID:5684
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Fagot.a.exe
                                                                                                                                                                                                                                                                        "Fagot.a.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                        • Modifies Windows Defender Real-time Protection settings
                                                                                                                                                                                                                                                                        • Manipulates Digital Signatures
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • Impair Defenses: Safe Mode Boot
                                                                                                                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                                                                                                                        • Modifies WinLogon
                                                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                                                                                                                        • Checks processor information in registry
                                                                                                                                                                                                                                                                        • Enumerates system info in registry
                                                                                                                                                                                                                                                                        • Modifies Internet Explorer settings
                                                                                                                                                                                                                                                                        • Modifies Internet Explorer start page
                                                                                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                                                                                        PID:3872
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Flasher.exe
                                                                                                                                                                                                                                                                        "Flasher.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        PID:3304
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Floxif.exe
                                                                                                                                                                                                                                                                        "Floxif.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • Loads dropped DLL
                                                                                                                                                                                                                                                                        • Enumerates connected drives
                                                                                                                                                                                                                                                                        • Drops file in Program Files directory
                                                                                                                                                                                                                                                                        PID:2772
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 468
                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                          • Program crash
                                                                                                                                                                                                                                                                          PID:4756
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Funsoul.exe
                                                                                                                                                                                                                                                                        "Funsoul.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        PID:1140
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Gnil.exe
                                                                                                                                                                                                                                                                        "Gnil.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Drops file in Drivers directory
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        PID:3332
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\drivers\spoclsv.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\drivers\spoclsv.exe
                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                          PID:5704
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Gruel.a.exe
                                                                                                                                                                                                                                                                        "Gruel.a.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • Modifies system executable filetype association
                                                                                                                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                                                                                                                        • Modifies Internet Explorer settings
                                                                                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                        PID:3536
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Happy99.exe
                                                                                                                                                                                                                                                                        "Happy99.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                                                        PID:1108
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Heap41A.exe
                                                                                                                                                                                                                                                                        "Heap41A.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                        PID:5864
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\Users\Admin\AppData\Local\Temp\MicrosoftPowerPoint\svchost.exe" MicrosoftPowerPoint\install.txt
                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                          • Drops startup file
                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                          PID:5320
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Hydra.exe
                                                                                                                                                                                                                                                                        "Hydra.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        PID:692
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Kiray.exe
                                                                                                                                                                                                                                                                        "Kiray.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • Modifies system executable filetype association
                                                                                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                        PID:3424
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Klez.e.exe
                                                                                                                                                                                                                                                                        "Klez.e.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                        PID:5828
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Kobalc.exe
                                                                                                                                                                                                                                                                        "Kobalc.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Looks for VMWare Tools registry key
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                                                                                                                        PID:32
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Lacon.exe
                                                                                                                                                                                                                                                                        "Lacon.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Drops startup file
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                        PID:640
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Launcher.exe
                                                                                                                                                                                                                                                                        "Launcher.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        PID:3300
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Lentin.c.exe
                                                                                                                                                                                                                                                                        "Lentin.c.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • Modifies system executable filetype association
                                                                                                                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                        • Modifies Internet Explorer settings
                                                                                                                                                                                                                                                                        • Modifies Internet Explorer start page
                                                                                                                                                                                                                                                                        PID:3956
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Lentin.d.exe
                                                                                                                                                                                                                                                                        "Lentin.d.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        • Modifies system executable filetype association
                                                                                                                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                                                                                                                        PID:3648
                                                                                                                                                                                                                                                                      • C:\Users\Admin\Desktop\Lokibot.exe
                                                                                                                                                                                                                                                                        "Lokibot.exe"
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                        PID:2360
                                                                                                                                                                                                                                                                        • C:\Users\Admin\Desktop\Lokibot.exe
                                                                                                                                                                                                                                                                          "C:\Users\Admin\Desktop\Lokibot.exe"
                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                            PID:5128
                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\Lokibot.exe
                                                                                                                                                                                                                                                                            "C:\Users\Admin\Desktop\Lokibot.exe"
                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                              PID:4992
                                                                                                                                                                                                                                                                            • C:\Users\Admin\Desktop\Lokibot.exe
                                                                                                                                                                                                                                                                              "C:\Users\Admin\Desktop\Lokibot.exe"
                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                PID:3168
                                                                                                                                                                                                                                                                              • C:\Users\Admin\Desktop\Lokibot.exe
                                                                                                                                                                                                                                                                                "C:\Users\Admin\Desktop\Lokibot.exe"
                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                  PID:2364
                                                                                                                                                                                                                                                                                • C:\Users\Admin\Desktop\Lokibot.exe
                                                                                                                                                                                                                                                                                  "C:\Users\Admin\Desktop\Lokibot.exe"
                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                    PID:5936
                                                                                                                                                                                                                                                                                • C:\Users\Admin\Desktop\Mabezat.exe
                                                                                                                                                                                                                                                                                  "Mabezat.exe"
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                  PID:424
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3400 -ip 3400
                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                  PID:4540
                                                                                                                                                                                                                                                                                • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                                                                                                                                                                  C:\Windows\system32\AUDIODG.EXE 0x00000000000004D4 0x00000000000004BC
                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                  PID:2824
                                                                                                                                                                                                                                                                                • C:\ProgramData\Windows\rutserv.exe
                                                                                                                                                                                                                                                                                  C:\ProgramData\Windows\rutserv.exe
                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                  PID:5144
                                                                                                                                                                                                                                                                                  • C:\ProgramData\Windows\rfusclient.exe
                                                                                                                                                                                                                                                                                    C:\ProgramData\Windows\rfusclient.exe
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                    PID:2148
                                                                                                                                                                                                                                                                                    • C:\ProgramData\Windows\rfusclient.exe
                                                                                                                                                                                                                                                                                      C:\ProgramData\Windows\rfusclient.exe /tray
                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                      • Suspicious behavior: SetClipboardViewer
                                                                                                                                                                                                                                                                                      PID:1080
                                                                                                                                                                                                                                                                                  • C:\ProgramData\Windows\rfusclient.exe
                                                                                                                                                                                                                                                                                    C:\ProgramData\Windows\rfusclient.exe /tray
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                    PID:4212
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2772 -ip 2772
                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                    PID:3492
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2152 -ip 2152
                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                      PID:3168
                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Winkomz.exe
                                                                                                                                                                                                                                                                                      C:\Windows\SysWOW64\Winkomz.exe
                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                                                                      PID:5124
                                                                                                                                                                                                                                                                                    • C:\Windows\Fonts\wmsncs.exe
                                                                                                                                                                                                                                                                                      "C:\Windows\Fonts\wmsncs.exe"
                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                      • Boot or Logon Autostart Execution: Active Setup
                                                                                                                                                                                                                                                                                      • Looks for VMWare Tools registry key
                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                                                      PID:6072
                                                                                                                                                                                                                                                                                    • C:\Windows\system32\LogonUI.exe
                                                                                                                                                                                                                                                                                      "LogonUI.exe" /flags:0x0 /state0:0xa397c055 /state1:0x41c64e6d
                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                        PID:3800
                                                                                                                                                                                                                                                                                      • C:\Windows\System32\smss.exe
                                                                                                                                                                                                                                                                                        \SystemRoot\System32\smss.exe 00000128 0000008c
                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                          PID:5828
                                                                                                                                                                                                                                                                                        • C:\Windows\System32\smss.exe
                                                                                                                                                                                                                                                                                          \SystemRoot\System32\smss.exe 00000108 0000008c
                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                            PID:32

                                                                                                                                                                                                                                                                                          Network

                                                                                                                                                                                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                                                                                                                          Downloads

                                                                                                                                                                                                                                                                                          • C:\Program Files\Common Files\System\symsrv.dll

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            72KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            ccf7e487353602c57e2e743d047aca36

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            99f66919152d67a882685a41b7130af5f7703888

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            eaf76e5f1a438478ecf7b678744da34e9d9e5038b128f0c595672ee1dbbfd914

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            dde0366658082b142faa6487245bfc8b8942605f0ede65d12f8c368ff3673ca18e416a4bf132c4bee5be43e94aef0531be2008746c24f1e6b2f294a63ab1486c

                                                                                                                                                                                                                                                                                          • C:\ProgramData\Hdlharas\dlrarhsiva.exe

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            9.1MB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            64261d5f3b07671f15b7f10f2f78da3f

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            d4f978177394024bb4d0e5b6b972a5f72f830181

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            87f51b4632c5fbc351a59a234dfefef506d807f2c173aac23162b85d0d73c2ad

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            3a9ff39e6bc7585b0b03f7327652e4c3b766563e8b183c25b6497e30956945add5684f1579862117e44c6bac2802601fc7c4d2a0daa1824f16c4da1fd6c9c91a

                                                                                                                                                                                                                                                                                          • C:\ProgramData\Hdlharas\mdkhm.zip

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            56KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            b635f6f767e485c7e17833411d567712

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            5a9cbdca7794aae308c44edfa7a1ff5b155e4aa8

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            6838286fb88e9e4e68882601a13fa770f1b510a0a86389b6a29070a129bf2e5e

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            551ba05bd44e66685f359802b35a8c9775792a12844906b4b53e1a000d56624c6db323754331c9f399072790991c1b256d9114a50fb78111652a1c973d2880af

                                                                                                                                                                                                                                                                                          • C:\ProgramData\Microsoft\Intel\taskhost.exe

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            3.6MB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            c5ec8996fc800325262f5d066f5d61c9

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            95f8e486960d1ddbec88be92ef71cb03a3643291

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            892e0afefca9c88d43bdd1beea0f09faadef618af0226e7cd1acdb47e871a0db

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            4721692047759aea6cb6e5c6abf72602c356ab826326779e126cda329fa3f7e4c468bdb651bb664cc7638a23fca77bc2d006a3fe0794badc09d6643d738e885a

                                                                                                                                                                                                                                                                                          • C:\ProgramData\Windows\winit.exe

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            961KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            03a781bb33a21a742be31deb053221f3

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            3951c17d7cadfc4450c40b05adeeb9df8d4fb578

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            e95fc3e7ed9ec61ba7214cc3fe5d869e2ee22abbeac3052501813bb2b6dde210

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            010a599491a8819be6bd6e8ba3f2198d8f8d668b6f18edda4408a890a2769e251b3515d510926a1479cc1fa011b15eba660d97deccd6e1fb4f2d277a5d062d45

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            152B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            1fc959921446fa3ab5813f75ca4d0235

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            0aeef3ba7ba2aa1f725fca09432d384b06995e2a

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            1b1e89d3b2f3da84cc8494d07cf0babc472c426ccb1c4ae13398243360c9d02c

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            899d1e1b0feece25ac97527daddcaaeb069cb428532477849eba43a627502c590261f2c26fef31e4e20efd3d7eb0815336a784c4d2888e05afcf5477af872b06

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            152B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            e9a2c784e6d797d91d4b8612e14d51bd

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            25e2b07c396ee82e4404af09424f747fc05f04c2

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            18ddbb93c981d8006071f9d26924ce3357cad212cbb65f48812d4a474c197ce6

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            fc35688ae3cd448ed6b2069d39ce1219612c54f5bb0dd7b707c9e6f39450fe9fb1338cf5bd0b82a45207fac2fbab1e0eae77e5c9e6488371390eab45f76a5df1

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            62KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            c813a1b87f1651d642cdcad5fca7a7d8

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            0e6628997674a7dfbeb321b59a6e829d0c2f4478

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            df670e09f278fea1d0684afdcd0392a83d7041585ba5996f7b527974d7d98ec3

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            af0d024ba1faafbd6f950c67977ed126827180a47cea9758ee51a95d13436f753eb5a7aa12a9090048a70328f6e779634c612aebde89b06740ffd770751e1c5b

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            67KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            69df804d05f8b29a88278b7d582dd279

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            d9560905612cf656d5dd0e741172fb4cd9c60688

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            b885987a52236f56ce7a5ca18b18533e64f62ab64eb14050ede93c93b5bd5608

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            0ef49eeeeb463da832f7d5b11f6418baa65963de62c00e71d847183e0035be03e63c097103d30329582fe806d246e3c0e3ecab8b2498799abbb21d8b7febdc0e

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            19KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            1bd4ae71ef8e69ad4b5ffd8dc7d2dcb5

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            6dd8803e59949c985d6a9df2f26c833041a5178c

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            af18b3681e8e2a1e8dc34c2aa60530dc8d8a9258c4d562cbe20c898d5de98725

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            b3ff083b669aca75549396250e05344ba2f1c021468589f2bd6f1b977b7f11df00f958bbbd22f07708b5d30d0260f39d8de57e75382b3ab8e78a2c41ef428863

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            63KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            226541550a51911c375216f718493f65

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            f6e608468401f9384cabdef45ca19e2afacc84bd

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            caecff4179910ce0ff470f9fa9eb4349e8fb717fa1432cf19987450a4e1ef4a5

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            2947b309f15e0e321beb9506861883fde8391c6f6140178c7e6ee7750d6418266360c335477cae0b067a6a6d86935ec5f7acdfdacc9edffa8b04ec71be210516

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            3KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            baccc811947d0352bbb2868242b22fe5

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            31005bcf8cc632c841714fa14d96018e0ba645e9

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            25f6cb38f2140082827510865c0097d9bc09986654cc3cb38b3425a82aeb30c3

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            1b76a5e01384a3f24b32346a6c661dcd83488caba1f1302a816a15bfb473f14c4b87b14844aac4105561c83c35ef240bba03d24fd411c973322bc9c667f9b510

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            865B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            467469c01eb3f85bbe6ecdbbdfc5c2b3

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            f7b6c92ddca61ece9f0d4fedb7b55f274a9d66ec

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            1933fa5e756e4fcaf76f9abfac795ad3bce7e054e7960db596763838165edbde

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            63c798dca3d9c6a18316f16a036e7e7b7b1fc559f4d0895817fe5ab6918d2b2c546ed3ec34f5b156c462822253958e7c98e14615ba1c063addb55f8606418186

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            865B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            784051243fa064edec66af792fbe1c6e

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            b1259a0d7761590840115746adf4cf12be097996

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            eccb08edf280a3bc718858ce5431c8a82322380913ee9095dbb5988ec7f35877

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            929a01868fb2b48a49e4363869d24c389b1563e6ded61515a071dbffdbfa6942c362e0c2e4cc84be992dc498980ea7fcf9b844cac50ee204b1fe4f140bcf7710

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            94d7b5b26c9b3c859f249859a0906ee8

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            26b65e7a5c4fa29470e0ecd9178b58ae16ce89ce

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            0b80f169dd2a8d3c9c33038de5c0f57e0128955f27900920016eae95f7c4aab4

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            414211bbf33c5cfc28a4de95b81a3304f4ae9f013718c515a622587f9df718e1effb3886b561bf075665106736303d64181a6f644d1cf27aaef5164dc96f7b82

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            2e093dd9afd061cc2c37adbcf2806433

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            1349e801015ff24e3d7afc25f16d30a2b28cafd4

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            940acc711ae37b5762f43e4c626f085938f1fcf2ef9c396e679c40cbbfe6209d

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            438ae6ddb65ab6ecb0d3a0690fa7ede43980ff9f7a2e7cc5dc7a1da9045085133ba21f6209646a9282aa00916b7d804984debf5256592d4cfe071792e3da5763

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            b90176efa63f6148b0c2b8a39639ec28

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            9b1d9e51ecc13a2846c870d32a9c3dbcf3358133

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            57715fe7d261e112653a617134315d9de3215103697ce070a810cae6011f3104

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            0690d07bd1dccf31c55ef84717bfe28426cef6fc0471757213eb60fb0b18d63dcb60d9bdc18e634ba7e0174f2214b6952a1733b252fdbf6d4bc0cf1b5ef8e4f9

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            baa999ca745886b83809b71243a9a0ce

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            62e03e87bfb762df5f02c6a3b0cde5b484d4e83a

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            7198f5f09a1b8d8cd967a0b1e8d018286ebc4696cd573dd3babe4353eab1f0db

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            437009d9a25ca71c1820aa600b3ac7f4ccc0da0e00df41c244efe3f7066b4b1b2fd9f02677a0c0cf7b37e1dfc3073f0995e14b0c4fce387bbd13938534155214

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            4bc4b8b5b323c76da03c215f92b16fc0

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            b66d8c1e67660579d5f3fd3922352f7a1bdc1cf1

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            16c0f80c8adb9eb4fbbabea9e1f0112d30f3cad68b931d2fc27a94b9393e2ce1

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            e2601422667a8780581deefac702461b094178465ee57ee8b8d676a71b7830e7b90d673241000f55eac68c8bb5431e67e290b886ca8fe6105764eca8979014b2

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            b649577051f16fd08a0b3710632281ad

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            6f326205c274c10334859ac06464c692014bc8d7

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            9988ca0d6b57bc531244e6eb08587d511da281658ff06b3179f876fd411f980c

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            a1e378cb553918fd06322426ce6625d6996b2b71d6a323edca58aed34d8e326e03592157deaf58ddd0cb8813ef2371edf6c451becc2c9bbe4c3abbea697bedee

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            b8c72f23134cad81292fcef3d66c5fa0

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            9eba7b847782a4325c89125a23f30076cc5bb8a1

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            294ccc22c84780cfc51cdb084cc2ed5e12f572d6f7e58c94356491e663187dba

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            f132c609dcf5b51590de894c1548b90832cef1d8158a128f611fb0b46f04535d37389bf8fd89277859dd56518757358a4b1010acd50861a911cf3cc2a65b34d4

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe588085.TMP

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            4cbb94068f84aee991a8530eb27b5a4b

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            9377585f72563458b2ff993c6485a1f642b1a181

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            1e7b7db7585f3446454280bd12a5be73da0268f3dabb479a0e0b7e6b8fcb89bd

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            3d9503b39e3e05b65184d2286a60936f8535e2d9c66cc85f8e09df6a71376e7df4ebf27d3d382f2847d94bad222543f13c661580b9126ddd9b7f3039fca820e3

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            16B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            46295cac801e5d4857d09837238a6394

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            16B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            206702161f94c5cd39fadd03f4014d98

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            11KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            73022ad30d5e09740627bbd468188ccb

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            89de802dff9f8fb619efb0abee8dc4541782b38e

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            5e8850b116e71fc912580b99b779ba4068b52d0029c29eb5749a4e8c36d88621

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            c9136e2c423746e065059f67e1bd7f469643c690a02520fe85d9b954e87972e6ff5ddc5990853f15088109de1764f64845f3cca58715ca0aeb8178a9127e88ef

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            11KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            bd86a068716b75bd253814c708a68949

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            797d88e8628c9ef9d59f3f3b5d8a7d4bd82ff097

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            48d2cf38f8db7b05d57a767b5d4a0aead1e437a27be67bbf6b39dc4c962d1e79

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            0dcff0d6d4eed40faf0ca5446556fda24556ac46bb229ff7e49caa170fd16e2423a235ff713e076a634765aff78afaeafc1b68b9d51766de216550dd6e33e5cd

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            11KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            d426411c25c50d4b27d27f2d0e280fcd

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            208611834d079c7abf6ec7f3395e0db31fb14c72

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            e31229e66e82d58d2873f61e54e6403a7f7ac37d29be6a77e2fa6c9e341a5025

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            e5cc9d15fe283e3856e0abaa31822a89296f92328941d8604c511c4ba83e7cff825e864be5120f7624f829c95eaae75bb40266c11503cf22ead63f1da25a5a71

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            10KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            a353052e9db5ea16c1708dc1cdc5d0f5

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            779e766c9f25b11d344951cc92530ffaeccfe70b

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            5ccd748bcfe1111ca212272636eec7790a288e852c0f9314018ce6cbd437a6b8

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            b7f7a7e731964525fb451a0339b44d2d9a81b86407bb0bb415d8f237dca42039a414323d43ef0af779817afa4577a500f835909b26563d70284353dbe73b72fe

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            896KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            8ecaaee5a7d8963b5c2482bb67d5337e

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            a246522d23acc457e2438ba6b729717661ed0aa3

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            b77b39ebb0c5dfcd2f18e1b5abe747e50792e218bd0f7fba879c0eed7d9ea58b

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            f016b5deedc275bb502b4807f2ab639a8f38cd114ea1a59fde6ab7249a33b9dd8c5d9a753b4ea8529079e17eeeab7436d9e726c0fd1143f820042f4fc2080143

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            9KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            7050d5ae8acfbe560fa11073fef8185d

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            5bc38e77ff06785fe0aec5a345c4ccd15752560e

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\MicrosoftPowerPoint\svchost.exe

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            233KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            155e389a330dd7d7e1b274b8e46cdda7

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            6445697a6db02e1a0e76efe69a3c87959ce2a0d8

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            6390a4374f8d00c8dd4247e271137b2fa6259e0678b7b8bd29ce957058fd8f05

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            df8d78cf27e4a384371f755e6d0d7333c736067aeeb619e44cbc5d88381bdcbc09a9b8eeb8aafb764fc1aaf39680e387b3bca73021c6af5452c0b2e03f0e8091

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\autDF08.tmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4.5MB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            f9a9b17c831721033458d59bf69f45b6

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            472313a8a15aca343cf669cfc61a9ae65279e06b

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            9276d1bb2cd48fdf46161deaf7ad4b0dbcef9655d462584e104bd3f2a8c944ce

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            653a5c77ada9c4b80b64ae5183bc43102b32db75272d84be9201150af7f80d96a96ab68042a17f68551f60a39053f529bee0ec527e20ab5c1d6c100a504feda8

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Axam.exe

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            11KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            0fbf8022619ba56c545b20d172bf3b87

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            752e5ce51f0cf9192b8fa1d28a7663b46e3577ff

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            4ae7d63ec497143c2acde1ba79f1d9eed80086a420b6f0a07b1e2917da0a6c74

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            e8d44147609d04a1a158066d89b739c00b507c8ff208dac72fdc2a42702d336c057ae4b77c305f4ccdfe089665913098d84a3160a834aaebe41f95f4b4bfddeb

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\AddRepair.avi

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            538KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            f4a45342060084c4af9496d8014961b4

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            4560b468aeb63bc6de51f66fe9553235478a1c5e

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            b9e2c8c1bbe44ad12ad45a50f81d43543353c8409437c2c33f2f4359c9e301fb

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            0647d2a72f945d745676676db4492de2162644db433612a6c016973fc159f1a18af3d7704162673c0df2ecf85ed0b1b8a67fc5621e9d798d12771c209cf2dc2c

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\Adwind.exe

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            fe537a3346590c04d81d357e3c4be6e8

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            b1285f1d8618292e17e490857d1bdf0a79104837

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            bbc572cced7c94d63a7208f4aba4ed20d1350bef153b099035a86c95c8d96d4a

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            50a5c1ad99ee9f3a540cb30e87ebfdf7561f0a0ee35b3d06c394fa2bad06ca6088a04848ddcb25f449b3c98b89a91d1ba5859f1ed6737119b606968be250c8ce

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\AgentTesla.exe

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            2.8MB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            cce284cab135d9c0a2a64a7caec09107

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            e4b8f4b6cab18b9748f83e9fffd275ef5276199e

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            18aab0e981eee9e4ef8e15d4b003b14b3a1b0bfb7233fade8ee4b6a22a5abbb9

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            c45d021295871447ce60250ff9cbeba2b2a16a23371530da077d6235cfe5005f10fa228071542df3621462d913ad2f58236dc0c0cb390779eef86a10bba8429f

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\AgentTesla.exe.tmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            2.9MB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            22fdaf5c70319b300e3a7cbe50ff83af

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            3379f2881b694571055ef7e4f02026a1f1dcfa56

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            a842ccb70a45248107f81ab2a2410d0e58f128e604d40f8ce6013e07401d3a02

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            0afbb8a5494473e8f1369f8f3741b0fc99a07e622f77befd55d03d9eb9ea3fb7da0f4b280cb98cf139aaf8bf193ea076e83a792ddc2214c282fbd950ba158054

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\Amus.exe

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            50KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            47abd68080eee0ea1b95ae31968a3069

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            ffbdf4b2224b92bd78779a7c5ac366ccb007c14d

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            b5fc4fd50e4ba69f0c8c8e5c402813c107c605cab659960ac31b3c8356c4e0ec

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            c9dfabffe582b29e810db8866f8997af1bd3339fa30e79575377bde970fcad3e3b6e9036b3a88d0c5f4fa3545eea8904d9faabf00142d5775ea5508adcd4dc0a

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\Anap.a.exe

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            16KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            0231c3a7d92ead1bad77819d5bda939d

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            683523ae4b60ac43d62cac5dad05fd8b5b8b8ae0

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            da1798c0a49b991fbda674f02007b0a3be4703e2b07ee540539db7e5bf983278

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            e34af2a1bd8f17ddc994671db37b29728e933e62eded7aff93ab0194a813103cad9dba522388f9f67ba839196fb6ed54ce87e1bebcfd98957feb40b726a7e0c6

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\Avoid.exe

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            248KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            20d2c71d6d9daf4499ffc4a5d164f1c3

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            38e5dcd93f25386d05a34a5b26d3fba1bf02f7c8

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            3ac8cc58dcbceaec3dab046aea050357e0e2248d30b0804c738c9a5b037c220d

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            8ffd56fb3538eb60da2dde9e3d6eee0dac8419c61532e9127f47c4351b6e53e01143af92b2e26b521e23cdbbf15d7a358d3757431e572e37a1eede57c7d39704

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\Blaster.E.exe

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            8676210e6246948201aa014db471de90

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            86b30d1a8b7515dcab6c8d2781b85c6983709dbf

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            2e481059b9bc9686c676d69a80202eed5022c9a53ecd8cac215e70c601dd7fdc

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            5130e6ea6c5e1924af7d630a7b1c6e614b1482edcad3117a8dc56371269260b97793a7ccdbf3249054815b7c3b9c364b30e73e0f8e4cc230502b01d0d2f70bda

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\BlockGroup.aiff

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            410KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            f8415590be12bc45f65dc1ed940014ac

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            78eaa6dbdbabead9161bb9f3f40464a2970214a6

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            f03c34bbea1b868b6a9f024b68d28127df63c06d14f04da59a5534b0a413c4c8

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            b33287dd0832fa22c87483871d93f2c128cee19ef3327e94400a947d4da258592ab3993a401e6a2ed1752534d149ece14a47d820d059b8c1a29f6e5f7a532820

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\ClearSave.html

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            967KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            88aec1a01b596624faef1e8b20cfa1cb

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            a13125100a159a490e2dc558f6b2fb60d0e1bb93

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            e57a3fedfc0d8e141f2e44cb05cfdb65d3d8dea57c4fbe20f3e5dd786e2b331e

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            3b8d4ebb2a1475233008eb34fb9280c9d90d442aea584fe4b551db30d520c7073d727ab1f726bf78a15f592ed1fac3d7a637c077bb84cc46b979124b5639a908

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\DanaBot.exe.tmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            2.7MB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            276c9f7378896fefd23fd135cf66d107

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            5e6082bc03e9baf176d7c37cb1b422c9e4b5918c

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            bc05d7b6d1e48e278316e50844eb5433ee115f79e35ccf846b674c70735e0237

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            8b4e76b10aad123631267358fbbc67136cb11c824c35a9b9370293f2fc8069fecc3c4c8b3ec9de233561e87d012af0f92a11aa4e853c5692212cb353ea4ea545

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\DebugGrant.xlt

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            301KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            27f6653309ce692fa15b11271e83ff0f

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            c09c6af79724c4613e82b44b6f81960b549f220f

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            6f74379dfbb208e99ffb5d570b01d4e2160c5fc7ef9c8e2643839d796f0770df

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            54def6fc4d92e5e66eb886ad27ddee996a4d73a678c62902fe8f94341113625a78d19921ae4044c99f20ad90d9762c38c6e60ffd0e0b7c740cd231bcef41ddd7

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\DebugUnprotect.asx

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            447KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            2309784181122dd8a3f35dbeabecf9b0

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            3a61de3a619245c848399d7b3f58a96825373086

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            fdc44b7943860b0f71dd72fcf37acf508795f3f33ce2d47a59ab6772146f1a07

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            0cefc520adadac99a02905ed2ccad64feb237007e97c1fb6509c8a7004b0a8e890846b637312ee74ffd4b3d8dd8b014deabd90ee2dc43841aafa2f723d6d030c

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\EditSubmit.mht

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            264KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            57cf3f6d894e5c53245930b11f27dd5d

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            d5443e8513fc70d608e24fd19f8086b5528dacad

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            8566db7912c1c38871edbaa60a650cf774d4bce0cd7d341e34470a16bd63282f

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            94eb8e4b3d01dbfa0d17f811c6d3ff05de277ca4629526a44c9795d514c271196b28f9e29e7d20db2c24582c634350ceaa57f31672a81ee4da349bf20689176b

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\ExpandRemove.ico

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            465KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            a73ce70d0d820f2a2b180caa7f5311d2

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            bb496b47b9efd1db1f847d2ec842e63f7bb35f1a

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            1a981cbc10f6b56974089e8dcf49f2267207992be6a9f75e6906ee2eadab4058

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            6f009586db6ef96bab605f54623e353d0da3be7e1bff63ce23acd1cdd347916e2d7a2a6c845c1c8b5116f1912a0d41e789e0a4f301f9a88e6f0ae47bb72688d1

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\FindInitialize.mpeg

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            319KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            c29c7f02cf840aca5ac8ee918a57b439

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            9fae1c770145344eb4b7f50d9501eca69df692ff

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            a12ca5f21c75dde339290d00888f3f48b2be8337fa1872cdd9e02467c3b0583b

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            7739a7597701691d2f27c25a6d390a31dadea1ec0776c38bf34addd05aa465abdccb6d36624c0032af976467f7e746434556b6b5bc4d58d2cac7cfea75ec528e

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\Gruel.a.exe.tmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            180KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            41d668f8fa1433cca5d651f7da91f185

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            1f535967f24a1f3fdea4a95a37f8dd6eca9cb68d

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            30d69504b99bc70cab6228e5c6e7ce507110065f8ef2b6df7679c293fd3826c8

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            59a5d55e1c5c380c1c24158c8bdc26956496c965e5bb8762fe458249400f3a3a33cc09cf8069f5986550ba53061a9f98d56f9fe884064def54363b45f01ffcbb

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\Mabezat.exe.tmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            221KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            a559435bf0abfd228df4bd0a0d48d27e

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            ea2481b04e1030d4bb75dddf4f01fb2fb4db610c

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            08cb56f930cac70b7e9e81255107ccc53f4c700283d04ab712e92f4b3aec6cce

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            173b92fc2fcc6c976d1e62c579c693c459c1bd96a9381bec86c87ce49ba0e8f90011e5253adf9e87be2b47ef3a4fe7330bbe9743969175f8b34609ea7e6b0790

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\MeasureConvert.docx

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            356KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            d16b6e67934fb2a548a0173e8e49842b

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            09021da1bdf05786e49817e071ba25eed3f04ba0

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            400547c1b29e77463a0546f8ebbd265a8195115cd95c3816f029fa2081132ad2

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            4847ddadc9d9138d59f11915e1958d2eb68912e36d3c623739c6e263fab4f50ab537ba3550d62c02b21efdfb1369ee00cc3571023dcaff70b3d6df3cbe2e7c40

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\MeasureSkip.vbs

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            648KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            1ae9af7424534ee6d11f9a57afd0ae67

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            454550758c47a7c1c4db6e0031a7a612314936f3

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            bfb54789fb3c1c3f7efd01fa44497aa997cc3ef9418119e3c8ca0ec03c1b3775

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            4e93cce020b893af42d5d6cf32b04419bba122e6ab0dd7104af2c2914e0202efd88fd78e210c1426f448afd20c14518c9d31082240864afb4454942e32706b5e

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\OpenSkip.TS

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            629KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            00b09ae2c070c8d4419f282e118337d2

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            c68924caebefdeaaa50fb7f8b8ed6f1c2d5c7faf

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            b176dea1a124eb33f859d83dc331ae4a01c8f4bb5eeeb942abb1175c8c79f0a5

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            b1aabdd3e64d65435adac341b5b758d50007ed11a15e01645ad5f9d3a86d3de0b5284f661acf5bf2d85e41830567b53ed7bee9b9cf7213015eeed758179061c3

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\PingUninstall.au3

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            502KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            df3d058de01b629c60f1cb7b0d75660f

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            12e781d76c79be897dfefeb9661e6448c08518a4

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            09eca337596d9f74cd79be84778f4c66f7e98c0eff2cf22589007e0d334e54e6

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            7d555ad24f32e17e599bc9ee754471b0a37e2dfe01e792fead79c2f9e6ba1980f57ec82ce9c497ba35a19eee5814135d6b16d6316175cb0c07bc6d1db54f76c6

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\PopConvertTo.MOD

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            556KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            07e70a3403ef8c62eddb2e2998d642f1

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            f357af84959406728c37592462931b939fc1dc9a

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            e07d2d3327b2fdcfeb46216ff35162bf0423e6f0ed7b9883051fcf2506ada1f0

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            1a7c163c55b55473862b474fc7182579b8c5c6b35171d8319338a3ed2c294fbe668996f084859825c95a84463572836a0277d55ae4cec6e8cd1dca9d24fd2082

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\ProtectInvoke.xlsx

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            10KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            968171cad16743feefc9f3decf316ff7

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            fecdb5a9cf0f45f8bae49010badfbd00f7eb133d

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            41076a0281ff31c62b2eaf88d30670bb6e9d931fe2e8513f22d3fd5187b052f0

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            7b889dfef362df22fcba4002b24ac5c2bff47b9a624b7ffe3900f503a22d6723f7254b741d760fdc01e40c2e98bf8227d01f0675c13c99154ad6ef4f696ba9b3

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\ReadPush.docx

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            20KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            d9ef1f146b732fa7cc4f1e64f346b12e

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            4ee682d642afba338c89b41adbb9fa659916a0e0

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            fbdce018f736bae0aaf9e4f33a940f534d7bba67bc3674108e561e219d22a227

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            fe6e747b0a39dfd36820343bab6a6da32e1591de81317daeedaad5af7bc10b834de5544af77e159d156b07ede4fa4cb394911b09af8a355354bd630b584359a9

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\RepairBackup.001

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            283KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            5151cde2d23b7f994622117ef00689b8

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            da283f84b70178dd830fa3b6483b725b1edc4474

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            c8b4ce7b017bf1c3a3ea8748e586fc53da873ab3217afbf79ef2d38dea186552

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            3f6be94e6f98afd5b73a9780886cce902763cbca0d735b8c54573395b6637354cdb607021778cdbb84d03f67096048c9c78d1f5d985b5fb26b1de7e32dd7d912

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\RequestResize.MOD

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            666KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            2a58fd652b8f315ce24877fc6f9f94b0

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            966c4b1d86cc1fb29d69071532b0b0efcbfcec2e

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            6cac622c2584deebada8b30bdd65d81a518cc373971dcbb121ea639745b2741a

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            1c174a72defe821c5e649a4a73b38d056278a9e920f674216658977f1ebfe62715424b2458160ec21324d97d6c0ee9962fcf30b7088cff735096b75a3d49b8bf

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\RestartFormat.dotm

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            392KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            49b86e9252232643dcdfcbb32bf6c2f6

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            555ca42705d6ee0fea15f1f32fbe284cc7b57096

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            5ee1b8c0c6a4108c5cc282bd229bbc28110d687ab9a9317c0cbd70c6f104c8df

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            b54fed351cbe3b95306d84ef015aea587770a4f42b5faa44e11bfe2929a0dd8405b3bb8d7a5e00017ad52345523c3eb3412b38a7f23da6cb83088ac6ee7ef081

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\SendFind.xsl

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            374KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            506839d68e2a9c8a17996a9f6e3f9039

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            9a7e3485bae79470c32d32f4a41aba41699b06e3

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            dc7d357b18cf535ff30965c567a100014235334bcdaa47e3edc9ce62734bf391

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            f50209925a7b1e0ab92136ea422494112e473b2bd17deff95b0cd9048be012ee9ac970081713dc6d7d16a05adc635b89fe74002929f6e1a0be726851f8475882

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\SkipJoin.sys

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            593KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            10c03c4c4cf9b87bf57cf387a7e90956

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            852d0c49c5ad9d5c3aeec3f7795ed0eb8453f3f6

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            6db39ecfcb793bb05ef3bda119cc59a4038c190b6b0cff38542683af90b16ba9

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            6e2e250b1ba323633d1260e2c9a54602bb26bb5ac3f88dbaddb9925f8446e2284e7545d7875303790424111bf2a964b9a2e267c8805e97a06425e3e0da17a5d3

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\SkipUninstall.vsw

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            429KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            2946b0a3c86a237c00a67a7888704aaf

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            827fe63bd188d20652eaf07a3b45cac4d57c55b6

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            474f137e3087c56459effee9ebf55da588f71a4659811a52abbc4545b55bc1f0

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            f89f541c8ce0fed93d7000a6e252d2e7294343a25037d49261c278d0fea624d16b39dc8cd6223c199c1b0fc734cabadf47b5e7022f5009e858167818e485ecd7

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\StepRegister.xps

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            483KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            184c76c0476537da5a79a5b51ff4024f

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            aeec73cb03ea9c19231755a436e1388fe54a9f82

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            2404a76e4ee9c1c6603ae9a25b8463a16e546a839eb94f9800f7eebfadd80af3

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            2d43d2715c3931bf5052cb572632b77ee3e6397f49d5c2211e428c6c59c6d57e10f904ac7ff68548c7acfc72ffeacca8b7f32c6c97b9a5ef3cb165de1d41cdb7

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\StopPush.7z

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            575KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            fb83018101b80f0a671990ef73bae5a1

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            2568076f9e6795608b91aee016cd04b1f02802b4

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            8090443a6db90a8c10d16e3676e1dabf457a3acca59a41b4ccc5bddbb36978ab

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            c1f36431f4f5b58dc0375ab60e5383e4a6fd0536f7fe77f4c96b3f4fbe34a0a2012b0a6bb73491289d07e8e98941deaebb1f0538e9b45c3277bc83d12466900d

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\SubmitDisconnect.wmv

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            611KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            45ea4f109a52a103b2a91f99675f3fa9

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            86091e9bef8d5dc3b15190bc2b2e3cd2f57f7eeb

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            56c4c343cb5927bd7f331e78695363b42b3644e5aac9cc074737a12b150341dd

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            e07a89dc0dafc4b68f2bda5034f31b1706b6dd9d7d1b2a33799c840f5ba10d9555dd5b18143e223d512fdc01a50c11c1c253106e350b395f4137bfab45a48d22

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\SuspendJoin.mov

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            337KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            0dca723018e7116046f2395fb76c53a0

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            ac2a3f55ee487903c38d132542668d53233e6de8

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            48e784712d1c935fb0cf0874bd4f8378712c164955ec8789cd82f5c8cf2cfdf1

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            a8093724558f8fd056ced98cb4e8251f3a50d614b8db0545e80919f4026da0acae3d39e3d0be42c611d2ae922f90822aae05ca7fbf2433572c709ad2b731e051

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\SuspendSet.M2TS

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            246KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            75905b101b1ea8943685a8c8db3d8ede

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            3a9623951bb173a52dca94da65994243c4ce227b

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            f9bf4c7ac51605a0ca5aded938131edac8043bce7e5bb37fab3705eaebf513e3

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            be26da74e8915ea919645f9c15ebdcef4f9a28d8e486ef1e652d478cbabe8b20b7f198334544bbd9309ccf9aa3ab51173fc0e3f118c8b6bbf3e0ee40f39bd604

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\TraceCompress.xlsx

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            10KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            47030da086b8c6d55b3ef5f699f7969e

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            eff9d51bd5a00e4fc0fcca667de39716c66f9a38

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            de13beadc09e5f389060f6d93694045eadd23737df9df20ce801163ffbe22826

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            01a2e75491e2128abf6b37dc904bdd759cf7d4bfd4cf4f5dea9f6d9d91649a45de4bc5a01aea76ad64584a4838859722898718ed34ad8b7a5062ab424dd8d253

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\UndoFind.mpeg2

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            684KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            79ce586dc0699708a757a525338437da

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            0b3bd81a70a4e81f361c4c265dc76af421242ea8

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            7917c6d1e4ba5bb6eabed8f5694f47ef1be421fc065ae7582da3ce711ac1a282

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            f80a5aad2d8db2b3f225a63d19cf477a814854a27f02d766581d37affcf1709f37fa8d8e4028e62e14e0f6abadfeb7aa065eb9e308f60b78b51018df7ff99a73

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\UninstallRestore.tif

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            520KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            727e2f24224f0fd9a9bbd18f18c6fab1

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            99e8b6835db259f81da16ed0184dac42bfa20b99

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            ab10788a6976187f8189d621f4e00cb3b73a90814db0665631193dfd3e1d354c

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            8da057f8d557671ca8ae2e5673a508b5bd94d82c7cb340e06e1a5e1784bd2eafb8e13f6f98ddee268b3d5648d0d9501b3d1a3ef08eedf8e383c9df8f76c08536

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\UpdateRemove.jfif

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            703KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            ff38b4a2db4e09941162733311e679ef

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            51a50f0a6d0d34323832264858c5267b317f0191

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            926c39d396ee7f0d81031c1a5bd8b03251a38cfd1ec7a2fc9ab768daa9ed53eb

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            aaa3b75dd6d5917030cdc014f173829196d67043543766d77c381ff382adfe219aaa583d2840a9e6558901375f9b7aab4a45477f49c78a4d8f4db10019a582c6

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\chilledwindows.mp4

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            3.6MB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            698ddcaec1edcf1245807627884edf9c

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            c7fcbeaa2aadffaf807c096c51fb14c47003ac20

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            cde975f975d21edb2e5faa505205ab8a2c5a565ba1ff8585d1f0e372b2a1d78b

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            a2c326f0c653edcd613a3cefc8d82006e843e69afc787c870aa1b9686a20d79e5ab4e9e60b04d1970f07d88318588c1305117810e73ac620afd1fb6511394155

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Desktop\run.bat

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            47B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            8d35d0d7e1ca3075d84850f9617cd7db

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            1fd7e994754451736b44e0deb7e1c9574fde6697

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            e79bfc6343f99089a97273021e1dabdad93900b87e83794ee1821dd5f19838bf

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            e8f5935eaf90bcdb466888a3d7438d9b8cb6ebf03ea7c5aa64c9e4b9c3d91a8f66bd46906a259a007badfccc7dbebc4e80707f3d632b825b110ae952fbee4edf

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Downloads\The-MALWARE-Repo-master.zip:Zone.Identifier

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            26B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            fbccf14d504b7b2dbcb5a5bda75bd93b

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            d59fc84cdd5217c6cf74785703655f78da6b582b

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Joke\YouAreAnIdiot\WebsiteSourceCode\lol.html

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            739B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            4a7a850be7fc7b24244ff1717664e1fd

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            9a8944abc7eadb81f4142675d676580a290715e6

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            425153a9209d191221afcc36ab14511ab28beb17cb92dd9cb9364429f21c0fab

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            2ac3a822eaad09cd5cc14747010d5a4c25319da9ff1622c312a217d0e7a9ae4cd9b7da086765f35bffd8ade03a07586afb3497e37bdeb8b01ef293305f2f7930

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\Joke\YouAreAnIdiot\WebsiteSourceCode\scripts\you.js

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            52771b95d0ae47eb577a89e36b94f69a

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            a0f8f5aa62a309339ea5a317968fed6d5c3302dd

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            2a5d7202705c5c6b72e8785704dd9718ca3b189924a89d959bf02250ebe400a6

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            e68dbf145c0472a684d9f041650da7c21d16f9bfc8535829b9e07b163422a5fff816adbe2b9c8e1e5208e644d6835e2ce6aa3e86900cbb0a45230093cd639cd5

                                                                                                                                                                                                                                                                                          • C:\Windows\Fonts\wmsncs.exe

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            185KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            15717cd327a723820d71900611545917

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            99184ec149d329e98cd3e600cfaba22a2f9a0156

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            db6cea7e8d62d3b21efe3b423b48c131e345cb55f168cbe1f142e491bb812747

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            a0de435db809e3e79f89411017e244c76145e010c67f894d41e265804c832f5514ac2f31cc9a0c667afa77aaaf3eccecac148279ca5a0feba492b222d5481a49

                                                                                                                                                                                                                                                                                          • C:\Windows\Maria.doc .exe

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            28KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            8e9d7feb3b955e6def8365fd83007080

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            df7522e270506b1a2c874700a9beeb9d3d233e23

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            94d2b1da2c4ce7db94ee9603bc2f81386032687e7c664aff6460ba0f5dac0022

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            4157a5628dc7f47489be2c30dbf2b14458a813eb66e942bba881615c101df25001c09afb9a54f88831fa4c1858f42d897f8f55fbf6b4c1a82d2509bd52ba1536

                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Bndt32.exe

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            12KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            cb0f7b3fd927cf0d0ba36302e6f9af86

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            32bdc349a35916e8991e69e9be1bd2596b6321cc

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            9b3f73a12a793d1648f3209e1e3f10bbb548b1ec21d53b8ac060b7b95ae4ef1f

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            e6152f3645d73c63f3f3aa9881fe8b404f9794b14a8ecaea659621828462baf042c13c88bb7f2c32277fa854ceda3056d09aa5603e92b107c6c8194464154252

                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Windupdt\winupdate.exe

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            756KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            c7dcd585b7e8b046f209052bcd6dd84b

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            604dcfae9eed4f65c80a4a39454db409291e08fa

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            0e8336ed51fe4551ced7d9aa5ce2dde945df8a0cc4e7c60199c24dd1cf7ccd48

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            c5ba102b12d2c685312d7dc8d58d98891b73243f56a8491ea7c41c2edaaad44ad90b8bc0748dbd8c84e92e9ae9bbd0b0157265ebe35fb9b63668c57d0e1ed5f2

                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Winkomz.exe

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            80KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            fbaa1397772f595d4f841557e19c5b1b

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            a365a2c3189474adeb4f1849057b68c03a3d3344

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            e85ab48871b47afb37fb24288e43be368ab75906a6ae8d2738aef15eed5386e8

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            d5d5160fbd7948b04201921d7229afe85e22390d6da25bf85406544a71e2c7a2e34c9f78c54c8c03680dbbe6ccf32912ee5b228b72bd4ae37a7f0f69c26a8977

                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\ddraw32.dll

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            22KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            f1ac5c806ed1e188c54e0861cbf1f358

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            b2a2895a0eae5e2ef8d10ed0f079d0fcfea9585a

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            87b7d23ab8720f1087d50a902244cbbdc25245b29da9bfa54698a4545b82afc4

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            ddb61b46a71db7401984e1917f0ef1498883cff76f0a98ff8d65acb08b6d7181511ca57a1e23c7482fc9d26afcf48b662896375b80eff4b2e0d08b7b55d9b98f

                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\dllhost32.exe

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            373KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            30cdab5cf1d607ee7b34f44ab38e9190

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            d4823f90d14eba0801653e8c970f47d54f655d36

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            1517527c1d705a6ebc6ec9194aa95459e875ac3902a9f4aab3bf24b6a6f8407f

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            b465f3b734beaea3951ff57759f13971649b549fafca71342b52d7e74949e152c0fbafe2df40354fc00b5dc8c767f3f5c6940e4ba308888e4395d8fd21e402b3

                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\drivers\spoclsv.exe

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            73KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            37e887b7a048ddb9013c8d2a26d5b740

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            713b4678c05a76dbd22e6f8d738c9ef655e70226

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            24c0638ff7571c7f4df5bcddd50bc478195823e934481fa3ee96eb1d1c4b4a1b

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            99f74eb00c6f6d1cbecb4d88e1056222e236cb85cf2a421243b63cd481939d3c4693e08edde743722d3320c27573fbcc99bf749ff72b857831e4b6667374b8af

                                                                                                                                                                                                                                                                                          • C:\Windows\nwgcs.txt

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            535B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            566a1954d079696e656dd8ff89815032

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            2f03676a496517e33df2382f67c415b4b5382496

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            7c8137c53a4db6051fb81adcdc5424e6795eba65f1c8ea9659f0de814c6cedb2

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            26c6d43fe8927dc721866cf6041c63bea46b56958b40b02ab62a59ffd79d81a6ce1912dfb8220341190a86389ae64abcebddcc5268173b5f16e67ea8d8a005d7

                                                                                                                                                                                                                                                                                          • C:\Windows\qexgnh.exe

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            26KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            d9ce0273f791da275ed2a69446413a87

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            38cf7ea93d74fb770bfba766845cf29bef0169df

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            aa2e8d70654e30cf11e2b57e92cea72a9823a048f75fc9029da04e1e4d8a9810

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            a521b2a55207c9996c0399bc0403c0865c23bf7457b5cfa80d0bec2c2eeb898a30599d99dda15ece4aa5db405c46ea4183d4b3bac20a3d5836775efccedd0f8e

                                                                                                                                                                                                                                                                                          • C:\Windows\wfvdgs.txt

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            367B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            6d1c6014bb4602f3364213260f674397

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            dd1fbd5fabadac0ffe9fa6bc09b86f9bacc586c7

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            87d17b7f0c94d93c6d339ceab31c6aa7d965185413444c5218c7ca3267ab96c5

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            3f86e5dd5754e1bfdc95353cac8945cb6a2edf6b3d9f83b69214933abf92d15809c4dc1d9b155a154984a1e544b0add655886484db66eaba0deb618470e2c021

                                                                                                                                                                                                                                                                                          • memory/32-1784-0x0000000000400000-0x0000000000636000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            2.2MB

                                                                                                                                                                                                                                                                                          • memory/32-1757-0x0000000000400000-0x0000000000636000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            2.2MB

                                                                                                                                                                                                                                                                                          • memory/248-1501-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            36KB

                                                                                                                                                                                                                                                                                          • memory/248-1526-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            36KB

                                                                                                                                                                                                                                                                                          • memory/248-1230-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            36KB

                                                                                                                                                                                                                                                                                          • memory/248-1423-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            36KB

                                                                                                                                                                                                                                                                                          • memory/424-1786-0x0000000001000000-0x0000000001026000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            152KB

                                                                                                                                                                                                                                                                                          • memory/640-1902-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            56KB

                                                                                                                                                                                                                                                                                          • memory/640-1760-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            56KB

                                                                                                                                                                                                                                                                                          • memory/692-1754-0x0000000005010000-0x000000000501A000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            40KB

                                                                                                                                                                                                                                                                                          • memory/692-1712-0x00000000006A0000-0x00000000006B0000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            64KB

                                                                                                                                                                                                                                                                                          • memory/692-1731-0x0000000005020000-0x00000000050B2000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            584KB

                                                                                                                                                                                                                                                                                          • memory/692-1713-0x00000000053B0000-0x0000000005956000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.6MB

                                                                                                                                                                                                                                                                                          • memory/1048-1357-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            828KB

                                                                                                                                                                                                                                                                                          • memory/1080-1513-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/1080-1516-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/1080-1515-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/1080-1514-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/1080-1518-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/1080-1512-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/1568-1244-0x0000000000400000-0x0000000000410000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            64KB

                                                                                                                                                                                                                                                                                          • memory/2148-1980-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/2148-1463-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/2148-1464-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/2148-1469-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/2148-1467-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/2148-1520-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/2148-1468-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/2148-1466-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/2164-1507-0x0000000000400000-0x000000000040C000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            48KB

                                                                                                                                                                                                                                                                                          • memory/2360-1781-0x00000000001B0000-0x0000000000202000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            328KB

                                                                                                                                                                                                                                                                                          • memory/2360-2007-0x0000000005DC0000-0x0000000005DE2000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            136KB

                                                                                                                                                                                                                                                                                          • memory/2360-1906-0x0000000005D70000-0x0000000005DB4000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            272KB

                                                                                                                                                                                                                                                                                          • memory/2360-1904-0x0000000005170000-0x0000000005178000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            32KB

                                                                                                                                                                                                                                                                                          • memory/2360-1783-0x0000000002380000-0x0000000002394000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            80KB

                                                                                                                                                                                                                                                                                          • memory/2360-1905-0x0000000005AF0000-0x0000000005AF8000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            32KB

                                                                                                                                                                                                                                                                                          • memory/2508-1232-0x0000000000400000-0x000000000043C000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            240KB

                                                                                                                                                                                                                                                                                          • memory/2656-14-0x00007FFC3C910000-0x00007FFC3CBC6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            2.7MB

                                                                                                                                                                                                                                                                                          • memory/2656-16-0x00007FFC2A2F0000-0x00007FFC2A3FE000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            1.1MB

                                                                                                                                                                                                                                                                                          • memory/2656-15-0x00007FFC2AA00000-0x00007FFC2BAB0000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            16.7MB

                                                                                                                                                                                                                                                                                          • memory/2656-13-0x00007FFC40140000-0x00007FFC40174000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            208KB

                                                                                                                                                                                                                                                                                          • memory/2656-12-0x00007FF616980000-0x00007FF616A78000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            992KB

                                                                                                                                                                                                                                                                                          • memory/2772-1948-0x0000000003B20000-0x0000000003B46000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            152KB

                                                                                                                                                                                                                                                                                          • memory/2772-1778-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            192KB

                                                                                                                                                                                                                                                                                          • memory/2772-1949-0x0000000003B20000-0x0000000003B46000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            152KB

                                                                                                                                                                                                                                                                                          • memory/2772-1619-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            192KB

                                                                                                                                                                                                                                                                                          • memory/2772-1698-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            56KB

                                                                                                                                                                                                                                                                                          • memory/2776-1509-0x0000000000400000-0x0000000000420000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            128KB

                                                                                                                                                                                                                                                                                          • memory/3332-1627-0x0000000000400000-0x0000000000444000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            272KB

                                                                                                                                                                                                                                                                                          • memory/3360-1594-0x0000000000400000-0x0000000000410000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            64KB

                                                                                                                                                                                                                                                                                          • memory/3360-1248-0x0000000000400000-0x0000000000410000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            64KB

                                                                                                                                                                                                                                                                                          • memory/3368-1614-0x000000001C1A0000-0x000000001C23C000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            624KB

                                                                                                                                                                                                                                                                                          • memory/3368-1621-0x0000000001050000-0x0000000001058000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            32KB

                                                                                                                                                                                                                                                                                          • memory/3368-1622-0x000000001C400000-0x000000001C44C000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            304KB

                                                                                                                                                                                                                                                                                          • memory/3368-1612-0x000000001BBA0000-0x000000001C06E000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4.8MB

                                                                                                                                                                                                                                                                                          • memory/3368-1610-0x000000001B610000-0x000000001B6B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            664KB

                                                                                                                                                                                                                                                                                          • memory/3400-1249-0x0000000000400000-0x0000000000410000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            64KB

                                                                                                                                                                                                                                                                                          • memory/3400-1351-0x0000000000400000-0x0000000000410000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            64KB

                                                                                                                                                                                                                                                                                          • memory/3424-1741-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            32KB

                                                                                                                                                                                                                                                                                          • memory/3424-1890-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            32KB

                                                                                                                                                                                                                                                                                          • memory/3624-1421-0x0000000000400000-0x000000000040C000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            48KB

                                                                                                                                                                                                                                                                                          • memory/3624-1218-0x0000000000400000-0x000000000040C000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            48KB

                                                                                                                                                                                                                                                                                          • memory/3648-1936-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            80KB

                                                                                                                                                                                                                                                                                          • memory/3648-1785-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            80KB

                                                                                                                                                                                                                                                                                          • memory/3820-1947-0x0000000000400000-0x000000000040C000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            48KB

                                                                                                                                                                                                                                                                                          • memory/3956-1930-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            76KB

                                                                                                                                                                                                                                                                                          • memory/3956-1780-0x0000000000400000-0x0000000000413000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            76KB

                                                                                                                                                                                                                                                                                          • memory/4212-1462-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/4212-1460-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/4212-1470-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/4212-1461-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/4212-1472-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/4212-1459-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/4212-1981-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/4212-1521-0x0000000000400000-0x00000000009B6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.7MB

                                                                                                                                                                                                                                                                                          • memory/4324-1475-0x0000000000400000-0x000000000040C000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            48KB

                                                                                                                                                                                                                                                                                          • memory/4324-1373-0x0000000000400000-0x000000000040C000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            48KB

                                                                                                                                                                                                                                                                                          • memory/4484-1426-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/4484-1427-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/4484-1425-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/4484-1432-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/4484-1428-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/4484-1430-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/4484-1429-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/4716-1607-0x0000000000400000-0x0000000000406000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            24KB

                                                                                                                                                                                                                                                                                          • memory/4812-1508-0x0000000000400000-0x000000000040C000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            48KB

                                                                                                                                                                                                                                                                                          • memory/4812-1529-0x0000000000400000-0x000000000040C000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            48KB

                                                                                                                                                                                                                                                                                          • memory/5144-1456-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5144-1519-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5144-1969-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5144-1453-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5144-1454-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5144-1455-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5144-1457-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5144-1458-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5188-1369-0x000000001C2C0000-0x000000001C2C8000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            32KB

                                                                                                                                                                                                                                                                                          • memory/5188-1370-0x000000001C370000-0x000000001C3A8000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            224KB

                                                                                                                                                                                                                                                                                          • memory/5188-1261-0x00000000009D0000-0x0000000000E34000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4.4MB

                                                                                                                                                                                                                                                                                          • memory/5188-1371-0x000000001C340000-0x000000001C34E000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            56KB

                                                                                                                                                                                                                                                                                          • memory/5204-1440-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5204-1433-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5204-1436-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5204-1438-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5204-1437-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5204-1435-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5204-1434-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5320-1916-0x0000000000400000-0x000000000040C000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            48KB

                                                                                                                                                                                                                                                                                          • memory/5332-1836-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            56KB

                                                                                                                                                                                                                                                                                          • memory/5332-1213-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            56KB

                                                                                                                                                                                                                                                                                          • memory/5348-1374-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            828KB

                                                                                                                                                                                                                                                                                          • memory/5504-1483-0x0000000000400000-0x00000000004A6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            664KB

                                                                                                                                                                                                                                                                                          • memory/5684-1779-0x000000001BDE0000-0x000000001C20E000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4.2MB

                                                                                                                                                                                                                                                                                          • memory/5684-1900-0x000000001DBC0000-0x000000001E0D0000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.1MB

                                                                                                                                                                                                                                                                                          • memory/5704-1638-0x0000000000400000-0x0000000000444000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            272KB

                                                                                                                                                                                                                                                                                          • memory/5928-1445-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5928-1444-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5928-1443-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5928-1442-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5928-1446-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5928-1441-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5928-1465-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                                                                          • memory/5932-1601-0x000001CA029A0000-0x000001CA029BE000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            120KB

                                                                                                                                                                                                                                                                                          • memory/6072-1767-0x0000000000400000-0x0000000000636000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            2.2MB

                                                                                                                                                                                                                                                                                          • memory/6112-1500-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            36KB

                                                                                                                                                                                                                                                                                          • memory/6112-1229-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            36KB

                                                                                                                                                                                                                                                                                          • memory/6112-1525-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            36KB

                                                                                                                                                                                                                                                                                          • memory/6112-1422-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            36KB